Sep 13 00:52:07.030583 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Sep 12 23:13:49 -00 2025 Sep 13 00:52:07.030612 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:07.030625 kernel: BIOS-provided physical RAM map: Sep 13 00:52:07.030632 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 13 00:52:07.030638 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 13 00:52:07.030644 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 13 00:52:07.030652 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Sep 13 00:52:07.030659 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Sep 13 00:52:07.030673 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 13 00:52:07.030700 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 13 00:52:07.030708 kernel: NX (Execute Disable) protection: active Sep 13 00:52:07.030718 kernel: SMBIOS 2.8 present. Sep 13 00:52:07.030728 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Sep 13 00:52:07.030737 kernel: Hypervisor detected: KVM Sep 13 00:52:07.030748 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 13 00:52:07.030764 kernel: kvm-clock: cpu 0, msr 2b19f001, primary cpu clock Sep 13 00:52:07.030773 kernel: kvm-clock: using sched offset of 3097448238 cycles Sep 13 00:52:07.030781 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 13 00:52:07.030792 kernel: tsc: Detected 2494.140 MHz processor Sep 13 00:52:07.030800 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 13 00:52:07.030808 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 13 00:52:07.030815 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Sep 13 00:52:07.030822 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 13 00:52:07.030833 kernel: ACPI: Early table checksum verification disabled Sep 13 00:52:07.030841 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Sep 13 00:52:07.030848 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030855 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030862 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030870 kernel: ACPI: FACS 0x000000007FFE0000 000040 Sep 13 00:52:07.030877 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030884 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030891 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030901 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 13 00:52:07.030908 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Sep 13 00:52:07.030915 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Sep 13 00:52:07.030922 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Sep 13 00:52:07.030930 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Sep 13 00:52:07.030937 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Sep 13 00:52:07.030944 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Sep 13 00:52:07.030951 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Sep 13 00:52:07.030966 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Sep 13 00:52:07.030973 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Sep 13 00:52:07.030981 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Sep 13 00:52:07.030989 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Sep 13 00:52:07.030997 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Sep 13 00:52:07.031005 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Sep 13 00:52:07.031015 kernel: Zone ranges: Sep 13 00:52:07.031023 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 13 00:52:07.031031 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Sep 13 00:52:07.031038 kernel: Normal empty Sep 13 00:52:07.031046 kernel: Movable zone start for each node Sep 13 00:52:07.031054 kernel: Early memory node ranges Sep 13 00:52:07.031062 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 13 00:52:07.031069 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Sep 13 00:52:07.031077 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Sep 13 00:52:07.031088 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 13 00:52:07.031098 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 13 00:52:07.031105 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Sep 13 00:52:07.031113 kernel: ACPI: PM-Timer IO Port: 0x608 Sep 13 00:52:07.031121 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 13 00:52:07.031129 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 13 00:52:07.031136 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 13 00:52:07.031144 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 13 00:52:07.031152 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 13 00:52:07.031163 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 13 00:52:07.031174 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 13 00:52:07.031182 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 13 00:52:07.031189 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 13 00:52:07.031197 kernel: TSC deadline timer available Sep 13 00:52:07.031205 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Sep 13 00:52:07.031213 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Sep 13 00:52:07.031220 kernel: Booting paravirtualized kernel on KVM Sep 13 00:52:07.031228 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 13 00:52:07.031239 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Sep 13 00:52:07.031246 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Sep 13 00:52:07.031254 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Sep 13 00:52:07.031262 kernel: pcpu-alloc: [0] 0 1 Sep 13 00:52:07.031269 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Sep 13 00:52:07.031277 kernel: kvm-guest: PV spinlocks disabled, no host support Sep 13 00:52:07.031285 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Sep 13 00:52:07.031293 kernel: Policy zone: DMA32 Sep 13 00:52:07.031311 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:07.031323 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 13 00:52:07.031353 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 13 00:52:07.031361 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 13 00:52:07.031369 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 13 00:52:07.031395 kernel: Memory: 1973276K/2096612K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47492K init, 4088K bss, 123076K reserved, 0K cma-reserved) Sep 13 00:52:07.031407 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Sep 13 00:52:07.031418 kernel: Kernel/User page tables isolation: enabled Sep 13 00:52:07.031429 kernel: ftrace: allocating 34614 entries in 136 pages Sep 13 00:52:07.031445 kernel: ftrace: allocated 136 pages with 2 groups Sep 13 00:52:07.031456 kernel: rcu: Hierarchical RCU implementation. Sep 13 00:52:07.031469 kernel: rcu: RCU event tracing is enabled. Sep 13 00:52:07.031481 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Sep 13 00:52:07.031493 kernel: Rude variant of Tasks RCU enabled. Sep 13 00:52:07.031506 kernel: Tracing variant of Tasks RCU enabled. Sep 13 00:52:07.031517 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 13 00:52:07.031528 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Sep 13 00:52:07.031540 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Sep 13 00:52:07.031550 kernel: random: crng init done Sep 13 00:52:07.031568 kernel: Console: colour VGA+ 80x25 Sep 13 00:52:07.031577 kernel: printk: console [tty0] enabled Sep 13 00:52:07.031585 kernel: printk: console [ttyS0] enabled Sep 13 00:52:07.031593 kernel: ACPI: Core revision 20210730 Sep 13 00:52:07.031601 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Sep 13 00:52:07.031609 kernel: APIC: Switch to symmetric I/O mode setup Sep 13 00:52:07.031617 kernel: x2apic enabled Sep 13 00:52:07.031625 kernel: Switched APIC routing to physical x2apic. Sep 13 00:52:07.031633 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Sep 13 00:52:07.031644 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Sep 13 00:52:07.031652 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) Sep 13 00:52:07.031667 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Sep 13 00:52:07.031680 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Sep 13 00:52:07.031691 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 13 00:52:07.031705 kernel: Spectre V2 : Mitigation: Retpolines Sep 13 00:52:07.031714 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 13 00:52:07.031722 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Sep 13 00:52:07.031730 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 13 00:52:07.031752 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Sep 13 00:52:07.031760 kernel: MDS: Mitigation: Clear CPU buffers Sep 13 00:52:07.031772 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Sep 13 00:52:07.031781 kernel: active return thunk: its_return_thunk Sep 13 00:52:07.031789 kernel: ITS: Mitigation: Aligned branch/return thunks Sep 13 00:52:07.031797 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 13 00:52:07.031806 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 13 00:52:07.031814 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 13 00:52:07.031823 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 13 00:52:07.031834 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Sep 13 00:52:07.031842 kernel: Freeing SMP alternatives memory: 32K Sep 13 00:52:07.031851 kernel: pid_max: default: 32768 minimum: 301 Sep 13 00:52:07.031859 kernel: LSM: Security Framework initializing Sep 13 00:52:07.031867 kernel: SELinux: Initializing. Sep 13 00:52:07.031876 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:52:07.031884 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Sep 13 00:52:07.031895 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Sep 13 00:52:07.031904 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Sep 13 00:52:07.031913 kernel: signal: max sigframe size: 1776 Sep 13 00:52:07.031921 kernel: rcu: Hierarchical SRCU implementation. Sep 13 00:52:07.031930 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Sep 13 00:52:07.031938 kernel: smp: Bringing up secondary CPUs ... Sep 13 00:52:07.031946 kernel: x86: Booting SMP configuration: Sep 13 00:52:07.031955 kernel: .... node #0, CPUs: #1 Sep 13 00:52:07.031963 kernel: kvm-clock: cpu 1, msr 2b19f041, secondary cpu clock Sep 13 00:52:07.031975 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Sep 13 00:52:07.031983 kernel: smp: Brought up 1 node, 2 CPUs Sep 13 00:52:07.031991 kernel: smpboot: Max logical packages: 1 Sep 13 00:52:07.032000 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) Sep 13 00:52:07.032008 kernel: devtmpfs: initialized Sep 13 00:52:07.032017 kernel: x86/mm: Memory block size: 128MB Sep 13 00:52:07.032025 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 13 00:52:07.032033 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Sep 13 00:52:07.032042 kernel: pinctrl core: initialized pinctrl subsystem Sep 13 00:52:07.032053 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 13 00:52:07.032061 kernel: audit: initializing netlink subsys (disabled) Sep 13 00:52:07.032069 kernel: audit: type=2000 audit(1757724725.583:1): state=initialized audit_enabled=0 res=1 Sep 13 00:52:07.032077 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 13 00:52:07.032086 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 13 00:52:07.032094 kernel: cpuidle: using governor menu Sep 13 00:52:07.032105 kernel: ACPI: bus type PCI registered Sep 13 00:52:07.032113 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 13 00:52:07.032122 kernel: dca service started, version 1.12.1 Sep 13 00:52:07.032133 kernel: PCI: Using configuration type 1 for base access Sep 13 00:52:07.032142 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 13 00:52:07.032150 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Sep 13 00:52:07.032158 kernel: ACPI: Added _OSI(Module Device) Sep 13 00:52:07.032167 kernel: ACPI: Added _OSI(Processor Device) Sep 13 00:52:07.032175 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 13 00:52:07.032183 kernel: ACPI: Added _OSI(Linux-Dell-Video) Sep 13 00:52:07.032191 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Sep 13 00:52:07.032200 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Sep 13 00:52:07.032211 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 13 00:52:07.032219 kernel: ACPI: Interpreter enabled Sep 13 00:52:07.032227 kernel: ACPI: PM: (supports S0 S5) Sep 13 00:52:07.032236 kernel: ACPI: Using IOAPIC for interrupt routing Sep 13 00:52:07.032245 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 13 00:52:07.032253 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Sep 13 00:52:07.032261 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 13 00:52:07.032521 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Sep 13 00:52:07.032642 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Sep 13 00:52:07.032655 kernel: acpiphp: Slot [3] registered Sep 13 00:52:07.032664 kernel: acpiphp: Slot [4] registered Sep 13 00:52:07.032672 kernel: acpiphp: Slot [5] registered Sep 13 00:52:07.032681 kernel: acpiphp: Slot [6] registered Sep 13 00:52:07.032689 kernel: acpiphp: Slot [7] registered Sep 13 00:52:07.032697 kernel: acpiphp: Slot [8] registered Sep 13 00:52:07.032706 kernel: acpiphp: Slot [9] registered Sep 13 00:52:07.032715 kernel: acpiphp: Slot [10] registered Sep 13 00:52:07.032727 kernel: acpiphp: Slot [11] registered Sep 13 00:52:07.032735 kernel: acpiphp: Slot [12] registered Sep 13 00:52:07.032744 kernel: acpiphp: Slot [13] registered Sep 13 00:52:07.032753 kernel: acpiphp: Slot [14] registered Sep 13 00:52:07.032761 kernel: acpiphp: Slot [15] registered Sep 13 00:52:07.032770 kernel: acpiphp: Slot [16] registered Sep 13 00:52:07.032778 kernel: acpiphp: Slot [17] registered Sep 13 00:52:07.032786 kernel: acpiphp: Slot [18] registered Sep 13 00:52:07.032794 kernel: acpiphp: Slot [19] registered Sep 13 00:52:07.032806 kernel: acpiphp: Slot [20] registered Sep 13 00:52:07.032814 kernel: acpiphp: Slot [21] registered Sep 13 00:52:07.032822 kernel: acpiphp: Slot [22] registered Sep 13 00:52:07.032831 kernel: acpiphp: Slot [23] registered Sep 13 00:52:07.032840 kernel: acpiphp: Slot [24] registered Sep 13 00:52:07.032848 kernel: acpiphp: Slot [25] registered Sep 13 00:52:07.032857 kernel: acpiphp: Slot [26] registered Sep 13 00:52:07.032865 kernel: acpiphp: Slot [27] registered Sep 13 00:52:07.032873 kernel: acpiphp: Slot [28] registered Sep 13 00:52:07.032882 kernel: acpiphp: Slot [29] registered Sep 13 00:52:07.032893 kernel: acpiphp: Slot [30] registered Sep 13 00:52:07.032901 kernel: acpiphp: Slot [31] registered Sep 13 00:52:07.032910 kernel: PCI host bridge to bus 0000:00 Sep 13 00:52:07.033023 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 13 00:52:07.033109 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 13 00:52:07.033191 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 13 00:52:07.033273 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Sep 13 00:52:07.033369 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Sep 13 00:52:07.033455 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 13 00:52:07.033574 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Sep 13 00:52:07.033714 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Sep 13 00:52:07.033870 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Sep 13 00:52:07.034001 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Sep 13 00:52:07.038588 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Sep 13 00:52:07.038725 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Sep 13 00:52:07.038851 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Sep 13 00:52:07.038974 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Sep 13 00:52:07.039088 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Sep 13 00:52:07.039211 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Sep 13 00:52:07.039392 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Sep 13 00:52:07.039533 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Sep 13 00:52:07.039624 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Sep 13 00:52:07.039733 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Sep 13 00:52:07.039825 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Sep 13 00:52:07.039923 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Sep 13 00:52:07.040024 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Sep 13 00:52:07.040125 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Sep 13 00:52:07.040221 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 13 00:52:07.040336 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Sep 13 00:52:07.040463 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Sep 13 00:52:07.040595 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Sep 13 00:52:07.040731 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Sep 13 00:52:07.040895 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Sep 13 00:52:07.041041 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Sep 13 00:52:07.041186 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Sep 13 00:52:07.041349 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Sep 13 00:52:07.041573 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Sep 13 00:52:07.044621 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Sep 13 00:52:07.044745 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Sep 13 00:52:07.044859 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Sep 13 00:52:07.044978 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Sep 13 00:52:07.045101 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Sep 13 00:52:07.045228 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Sep 13 00:52:07.045374 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Sep 13 00:52:07.045545 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Sep 13 00:52:07.045640 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Sep 13 00:52:07.045771 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Sep 13 00:52:07.045914 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Sep 13 00:52:07.046058 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Sep 13 00:52:07.046152 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Sep 13 00:52:07.046241 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Sep 13 00:52:07.046253 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 13 00:52:07.046262 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 13 00:52:07.046271 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 13 00:52:07.046284 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 13 00:52:07.046293 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Sep 13 00:52:07.046314 kernel: iommu: Default domain type: Translated Sep 13 00:52:07.046323 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 13 00:52:07.046420 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Sep 13 00:52:07.046511 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 13 00:52:07.046599 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Sep 13 00:52:07.046611 kernel: vgaarb: loaded Sep 13 00:52:07.046620 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 13 00:52:07.046633 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 13 00:52:07.046642 kernel: PTP clock support registered Sep 13 00:52:07.046650 kernel: PCI: Using ACPI for IRQ routing Sep 13 00:52:07.046659 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 13 00:52:07.046668 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 13 00:52:07.046676 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Sep 13 00:52:07.046685 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Sep 13 00:52:07.046694 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Sep 13 00:52:07.046703 kernel: clocksource: Switched to clocksource kvm-clock Sep 13 00:52:07.046716 kernel: VFS: Disk quotas dquot_6.6.0 Sep 13 00:52:07.046725 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 13 00:52:07.046733 kernel: pnp: PnP ACPI init Sep 13 00:52:07.046742 kernel: pnp: PnP ACPI: found 4 devices Sep 13 00:52:07.046751 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 13 00:52:07.046759 kernel: NET: Registered PF_INET protocol family Sep 13 00:52:07.046768 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Sep 13 00:52:07.046777 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Sep 13 00:52:07.046786 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 13 00:52:07.046798 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 13 00:52:07.046806 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 13 00:52:07.046815 kernel: TCP: Hash tables configured (established 16384 bind 16384) Sep 13 00:52:07.046823 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:52:07.046832 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Sep 13 00:52:07.046841 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 13 00:52:07.046850 kernel: NET: Registered PF_XDP protocol family Sep 13 00:52:07.046947 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 13 00:52:07.047118 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 13 00:52:07.047203 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 13 00:52:07.053596 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Sep 13 00:52:07.053768 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Sep 13 00:52:07.053880 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Sep 13 00:52:07.053982 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 13 00:52:07.054103 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Sep 13 00:52:07.054160 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Sep 13 00:52:07.054280 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 30735 usecs Sep 13 00:52:07.054292 kernel: PCI: CLS 0 bytes, default 64 Sep 13 00:52:07.054314 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Sep 13 00:52:07.054324 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Sep 13 00:52:07.054332 kernel: Initialise system trusted keyrings Sep 13 00:52:07.054342 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Sep 13 00:52:07.054350 kernel: Key type asymmetric registered Sep 13 00:52:07.054359 kernel: Asymmetric key parser 'x509' registered Sep 13 00:52:07.054368 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Sep 13 00:52:07.054380 kernel: io scheduler mq-deadline registered Sep 13 00:52:07.054389 kernel: io scheduler kyber registered Sep 13 00:52:07.054398 kernel: io scheduler bfq registered Sep 13 00:52:07.054406 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 13 00:52:07.054415 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Sep 13 00:52:07.054423 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Sep 13 00:52:07.054432 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Sep 13 00:52:07.054441 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 13 00:52:07.054450 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 13 00:52:07.054461 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 13 00:52:07.054470 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 13 00:52:07.054479 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 13 00:52:07.054488 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Sep 13 00:52:07.054608 kernel: rtc_cmos 00:03: RTC can wake from S4 Sep 13 00:52:07.054694 kernel: rtc_cmos 00:03: registered as rtc0 Sep 13 00:52:07.054776 kernel: rtc_cmos 00:03: setting system clock to 2025-09-13T00:52:06 UTC (1757724726) Sep 13 00:52:07.054879 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Sep 13 00:52:07.054900 kernel: intel_pstate: CPU model not supported Sep 13 00:52:07.054911 kernel: NET: Registered PF_INET6 protocol family Sep 13 00:52:07.054923 kernel: Segment Routing with IPv6 Sep 13 00:52:07.054935 kernel: In-situ OAM (IOAM) with IPv6 Sep 13 00:52:07.054947 kernel: NET: Registered PF_PACKET protocol family Sep 13 00:52:07.054960 kernel: Key type dns_resolver registered Sep 13 00:52:07.054972 kernel: IPI shorthand broadcast: enabled Sep 13 00:52:07.054984 kernel: sched_clock: Marking stable (671628101, 79660096)->(861805653, -110517456) Sep 13 00:52:07.054997 kernel: registered taskstats version 1 Sep 13 00:52:07.055013 kernel: Loading compiled-in X.509 certificates Sep 13 00:52:07.055026 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: d4931373bb0d9b9f95da11f02ae07d3649cc6c37' Sep 13 00:52:07.055040 kernel: Key type .fscrypt registered Sep 13 00:52:07.055053 kernel: Key type fscrypt-provisioning registered Sep 13 00:52:07.055063 kernel: ima: No TPM chip found, activating TPM-bypass! Sep 13 00:52:07.055072 kernel: ima: Allocated hash algorithm: sha1 Sep 13 00:52:07.055080 kernel: ima: No architecture policies found Sep 13 00:52:07.055089 kernel: clk: Disabling unused clocks Sep 13 00:52:07.055101 kernel: Freeing unused kernel image (initmem) memory: 47492K Sep 13 00:52:07.055110 kernel: Write protecting the kernel read-only data: 28672k Sep 13 00:52:07.055119 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Sep 13 00:52:07.055128 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Sep 13 00:52:07.055136 kernel: Run /init as init process Sep 13 00:52:07.055145 kernel: with arguments: Sep 13 00:52:07.055180 kernel: /init Sep 13 00:52:07.055191 kernel: with environment: Sep 13 00:52:07.055200 kernel: HOME=/ Sep 13 00:52:07.055209 kernel: TERM=linux Sep 13 00:52:07.055220 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 13 00:52:07.055235 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:52:07.055247 systemd[1]: Detected virtualization kvm. Sep 13 00:52:07.055257 systemd[1]: Detected architecture x86-64. Sep 13 00:52:07.055266 systemd[1]: Running in initrd. Sep 13 00:52:07.055275 systemd[1]: No hostname configured, using default hostname. Sep 13 00:52:07.055284 systemd[1]: Hostname set to . Sep 13 00:52:07.055297 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:52:07.055317 systemd[1]: Queued start job for default target initrd.target. Sep 13 00:52:07.055326 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:52:07.055335 systemd[1]: Reached target cryptsetup.target. Sep 13 00:52:07.055345 systemd[1]: Reached target paths.target. Sep 13 00:52:07.055354 systemd[1]: Reached target slices.target. Sep 13 00:52:07.055363 systemd[1]: Reached target swap.target. Sep 13 00:52:07.055373 systemd[1]: Reached target timers.target. Sep 13 00:52:07.055406 systemd[1]: Listening on iscsid.socket. Sep 13 00:52:07.055421 systemd[1]: Listening on iscsiuio.socket. Sep 13 00:52:07.055434 systemd[1]: Listening on systemd-journald-audit.socket. Sep 13 00:52:07.055444 systemd[1]: Listening on systemd-journald-dev-log.socket. Sep 13 00:52:07.055453 systemd[1]: Listening on systemd-journald.socket. Sep 13 00:52:07.055462 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:52:07.055472 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:52:07.055481 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:52:07.055494 systemd[1]: Reached target sockets.target. Sep 13 00:52:07.055504 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:52:07.055515 systemd[1]: Finished network-cleanup.service. Sep 13 00:52:07.055525 systemd[1]: Starting systemd-fsck-usr.service... Sep 13 00:52:07.055534 systemd[1]: Starting systemd-journald.service... Sep 13 00:52:07.055544 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:52:07.055556 systemd[1]: Starting systemd-resolved.service... Sep 13 00:52:07.055565 systemd[1]: Starting systemd-vconsole-setup.service... Sep 13 00:52:07.055574 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:52:07.055587 systemd[1]: Finished systemd-fsck-usr.service. Sep 13 00:52:07.055596 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Sep 13 00:52:07.055614 systemd-journald[184]: Journal started Sep 13 00:52:07.055723 systemd-journald[184]: Runtime Journal (/run/log/journal/2c1e8b43281a41cc9ed289b42eadcdda) is 4.9M, max 39.5M, 34.5M free. Sep 13 00:52:07.044535 systemd-modules-load[185]: Inserted module 'overlay' Sep 13 00:52:07.057978 systemd-resolved[186]: Positive Trust Anchors: Sep 13 00:52:07.072333 systemd[1]: Started systemd-journald.service. Sep 13 00:52:07.057990 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:52:07.082621 kernel: audit: type=1130 audit(1757724727.072:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.058034 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:52:07.093775 kernel: audit: type=1130 audit(1757724727.082:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.093808 kernel: audit: type=1130 audit(1757724727.086:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.093821 kernel: audit: type=1130 audit(1757724727.087:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.061128 systemd-resolved[186]: Defaulting to hostname 'linux'. Sep 13 00:52:07.072623 systemd[1]: Started systemd-resolved.service. Sep 13 00:52:07.085270 systemd[1]: Finished systemd-vconsole-setup.service. Sep 13 00:52:07.087149 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Sep 13 00:52:07.087794 systemd[1]: Reached target nss-lookup.target. Sep 13 00:52:07.090904 systemd[1]: Starting dracut-cmdline-ask.service... Sep 13 00:52:07.102192 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 13 00:52:07.109450 systemd[1]: Finished dracut-cmdline-ask.service. Sep 13 00:52:07.112979 kernel: Bridge firewalling registered Sep 13 00:52:07.113010 kernel: audit: type=1130 audit(1757724727.109:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.109909 systemd-modules-load[185]: Inserted module 'br_netfilter' Sep 13 00:52:07.114021 systemd[1]: Starting dracut-cmdline.service... Sep 13 00:52:07.125517 dracut-cmdline[201]: dracut-dracut-053 Sep 13 00:52:07.127739 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=65d14b740db9e581daa1d0206188b16d2f1a39e5c5e0878b6855323cd7c584ec Sep 13 00:52:07.148338 kernel: SCSI subsystem initialized Sep 13 00:52:07.167058 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 13 00:52:07.167160 kernel: device-mapper: uevent: version 1.0.3 Sep 13 00:52:07.169327 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Sep 13 00:52:07.173597 systemd-modules-load[185]: Inserted module 'dm_multipath' Sep 13 00:52:07.175688 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:52:07.189110 kernel: audit: type=1130 audit(1757724727.184:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.186621 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:52:07.197328 kernel: Loading iSCSI transport class v2.0-870. Sep 13 00:52:07.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.202151 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:52:07.205656 kernel: audit: type=1130 audit(1757724727.202:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.216357 kernel: iscsi: registered transport (tcp) Sep 13 00:52:07.252625 kernel: iscsi: registered transport (qla4xxx) Sep 13 00:52:07.252747 kernel: QLogic iSCSI HBA Driver Sep 13 00:52:07.310230 systemd[1]: Finished dracut-cmdline.service. Sep 13 00:52:07.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.312455 systemd[1]: Starting dracut-pre-udev.service... Sep 13 00:52:07.314123 kernel: audit: type=1130 audit(1757724727.310:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.373347 kernel: raid6: avx2x4 gen() 17698 MB/s Sep 13 00:52:07.390333 kernel: raid6: avx2x4 xor() 7959 MB/s Sep 13 00:52:07.407350 kernel: raid6: avx2x2 gen() 18013 MB/s Sep 13 00:52:07.424359 kernel: raid6: avx2x2 xor() 20438 MB/s Sep 13 00:52:07.441344 kernel: raid6: avx2x1 gen() 13621 MB/s Sep 13 00:52:07.458334 kernel: raid6: avx2x1 xor() 18282 MB/s Sep 13 00:52:07.475336 kernel: raid6: sse2x4 gen() 12323 MB/s Sep 13 00:52:07.492359 kernel: raid6: sse2x4 xor() 7371 MB/s Sep 13 00:52:07.509349 kernel: raid6: sse2x2 gen() 13253 MB/s Sep 13 00:52:07.526344 kernel: raid6: sse2x2 xor() 8636 MB/s Sep 13 00:52:07.543340 kernel: raid6: sse2x1 gen() 11895 MB/s Sep 13 00:52:07.560500 kernel: raid6: sse2x1 xor() 5975 MB/s Sep 13 00:52:07.560602 kernel: raid6: using algorithm avx2x2 gen() 18013 MB/s Sep 13 00:52:07.560632 kernel: raid6: .... xor() 20438 MB/s, rmw enabled Sep 13 00:52:07.561646 kernel: raid6: using avx2x2 recovery algorithm Sep 13 00:52:07.574335 kernel: xor: automatically using best checksumming function avx Sep 13 00:52:07.681336 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Sep 13 00:52:07.693591 systemd[1]: Finished dracut-pre-udev.service. Sep 13 00:52:07.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.695020 systemd[1]: Starting systemd-udevd.service... Sep 13 00:52:07.694000 audit: BPF prog-id=7 op=LOAD Sep 13 00:52:07.694000 audit: BPF prog-id=8 op=LOAD Sep 13 00:52:07.700326 kernel: audit: type=1130 audit(1757724727.693:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.711002 systemd-udevd[383]: Using default interface naming scheme 'v252'. Sep 13 00:52:07.717543 systemd[1]: Started systemd-udevd.service. Sep 13 00:52:07.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.721259 systemd[1]: Starting dracut-pre-trigger.service... Sep 13 00:52:07.735215 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Sep 13 00:52:07.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.771350 systemd[1]: Finished dracut-pre-trigger.service. Sep 13 00:52:07.772545 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:52:07.821234 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:52:07.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:07.878327 kernel: libata version 3.00 loaded. Sep 13 00:52:07.881334 kernel: ata_piix 0000:00:01.1: version 2.13 Sep 13 00:52:07.908908 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Sep 13 00:52:07.928198 kernel: scsi host0: ata_piix Sep 13 00:52:07.928356 kernel: scsi host1: Virtio SCSI HBA Sep 13 00:52:07.928469 kernel: scsi host2: ata_piix Sep 13 00:52:07.928588 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Sep 13 00:52:07.928600 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Sep 13 00:52:07.928612 kernel: ACPI: bus type USB registered Sep 13 00:52:07.928623 kernel: usbcore: registered new interface driver usbfs Sep 13 00:52:07.928638 kernel: usbcore: registered new interface driver hub Sep 13 00:52:07.928649 kernel: usbcore: registered new device driver usb Sep 13 00:52:07.928659 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 13 00:52:07.928671 kernel: GPT:9289727 != 125829119 Sep 13 00:52:07.928681 kernel: GPT:Alternate GPT header not at the end of the disk. Sep 13 00:52:07.928692 kernel: cryptd: max_cpu_qlen set to 1000 Sep 13 00:52:07.928703 kernel: GPT:9289727 != 125829119 Sep 13 00:52:07.928713 kernel: GPT: Use GNU Parted to correct GPT errors. Sep 13 00:52:07.928723 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 13 00:52:07.930839 kernel: virtio_blk virtio5: [vdb] 932 512-byte logical blocks (477 kB/466 KiB) Sep 13 00:52:08.081323 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Sep 13 00:52:08.099328 kernel: AVX2 version of gcm_enc/dec engaged. Sep 13 00:52:08.099441 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Sep 13 00:52:08.100957 kernel: AES CTR mode by8 optimization enabled Sep 13 00:52:08.107627 kernel: ehci-pci: EHCI PCI platform driver Sep 13 00:52:08.109319 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (442) Sep 13 00:52:08.110284 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Sep 13 00:52:08.117260 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Sep 13 00:52:08.118273 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Sep 13 00:52:08.119541 kernel: uhci_hcd: USB Universal Host Controller Interface driver Sep 13 00:52:08.123113 systemd[1]: Starting disk-uuid.service... Sep 13 00:52:08.129385 disk-uuid[463]: Primary Header is updated. Sep 13 00:52:08.129385 disk-uuid[463]: Secondary Entries is updated. Sep 13 00:52:08.129385 disk-uuid[463]: Secondary Header is updated. Sep 13 00:52:08.140365 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:52:08.157499 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Sep 13 00:52:08.160890 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Sep 13 00:52:08.161040 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Sep 13 00:52:08.161146 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Sep 13 00:52:08.161243 kernel: hub 1-0:1.0: USB hub found Sep 13 00:52:08.161393 kernel: hub 1-0:1.0: 2 ports detected Sep 13 00:52:09.137322 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Sep 13 00:52:09.137929 disk-uuid[464]: The operation has completed successfully. Sep 13 00:52:09.181563 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 13 00:52:09.182555 systemd[1]: Finished disk-uuid.service. Sep 13 00:52:09.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.184477 systemd[1]: Starting verity-setup.service... Sep 13 00:52:09.203330 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 13 00:52:09.250472 systemd[1]: Found device dev-mapper-usr.device. Sep 13 00:52:09.252660 systemd[1]: Mounting sysusr-usr.mount... Sep 13 00:52:09.255626 systemd[1]: Finished verity-setup.service. Sep 13 00:52:09.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.333321 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Sep 13 00:52:09.333288 systemd[1]: Mounted sysusr-usr.mount. Sep 13 00:52:09.333816 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Sep 13 00:52:09.334707 systemd[1]: Starting ignition-setup.service... Sep 13 00:52:09.335886 systemd[1]: Starting parse-ip-for-networkd.service... Sep 13 00:52:09.350444 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:52:09.350507 kernel: BTRFS info (device vda6): using free space tree Sep 13 00:52:09.350520 kernel: BTRFS info (device vda6): has skinny extents Sep 13 00:52:09.371466 systemd[1]: mnt-oem.mount: Deactivated successfully. Sep 13 00:52:09.379002 systemd[1]: Finished ignition-setup.service. Sep 13 00:52:09.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.380426 systemd[1]: Starting ignition-fetch-offline.service... Sep 13 00:52:09.463995 systemd[1]: Finished parse-ip-for-networkd.service. Sep 13 00:52:09.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.464000 audit: BPF prog-id=9 op=LOAD Sep 13 00:52:09.465835 systemd[1]: Starting systemd-networkd.service... Sep 13 00:52:09.493610 systemd-networkd[689]: lo: Link UP Sep 13 00:52:09.493620 systemd-networkd[689]: lo: Gained carrier Sep 13 00:52:09.494704 systemd-networkd[689]: Enumeration completed Sep 13 00:52:09.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.495328 systemd[1]: Started systemd-networkd.service. Sep 13 00:52:09.495493 systemd-networkd[689]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Sep 13 00:52:09.495861 systemd[1]: Reached target network.target. Sep 13 00:52:09.496692 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Sep 13 00:52:09.497286 systemd[1]: Starting iscsiuio.service... Sep 13 00:52:09.502063 systemd-networkd[689]: eth1: Link UP Sep 13 00:52:09.502074 systemd-networkd[689]: eth1: Gained carrier Sep 13 00:52:09.505667 systemd-networkd[689]: eth0: Link UP Sep 13 00:52:09.505675 systemd-networkd[689]: eth0: Gained carrier Sep 13 00:52:09.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.517434 systemd-networkd[689]: eth1: DHCPv4 address 10.124.0.19/20 acquired from 169.254.169.253 Sep 13 00:52:09.517855 systemd[1]: Started iscsiuio.service. Sep 13 00:52:09.519340 systemd[1]: Starting iscsid.service... Sep 13 00:52:09.523497 systemd-networkd[689]: eth0: DHCPv4 address 146.190.141.251/20, gateway 146.190.128.1 acquired from 169.254.169.253 Sep 13 00:52:09.523906 ignition[618]: Ignition 2.14.0 Sep 13 00:52:09.523914 ignition[618]: Stage: fetch-offline Sep 13 00:52:09.523999 ignition[618]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:09.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.540616 iscsid[694]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:52:09.540616 iscsid[694]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Sep 13 00:52:09.540616 iscsid[694]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Sep 13 00:52:09.540616 iscsid[694]: If using hardware iscsi like qla4xxx this message can be ignored. Sep 13 00:52:09.540616 iscsid[694]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Sep 13 00:52:09.540616 iscsid[694]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Sep 13 00:52:09.524038 ignition[618]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:09.528239 systemd[1]: Started iscsid.service. Sep 13 00:52:09.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.547239 ignition[618]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:09.531063 systemd[1]: Starting dracut-initqueue.service... Sep 13 00:52:09.547353 ignition[618]: parsed url from cmdline: "" Sep 13 00:52:09.545584 systemd[1]: Finished dracut-initqueue.service. Sep 13 00:52:09.547357 ignition[618]: no config URL provided Sep 13 00:52:09.548404 systemd[1]: Reached target remote-fs-pre.target. Sep 13 00:52:09.547363 ignition[618]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:52:09.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.549504 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:52:09.547371 ignition[618]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:52:09.550351 systemd[1]: Reached target remote-fs.target. Sep 13 00:52:09.547391 ignition[618]: failed to fetch config: resource requires networking Sep 13 00:52:09.552030 systemd[1]: Starting dracut-pre-mount.service... Sep 13 00:52:09.547507 ignition[618]: Ignition finished successfully Sep 13 00:52:09.552909 systemd[1]: Finished ignition-fetch-offline.service. Sep 13 00:52:09.554334 systemd[1]: Starting ignition-fetch.service... Sep 13 00:52:09.568437 systemd[1]: Finished dracut-pre-mount.service. Sep 13 00:52:09.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.575937 ignition[704]: Ignition 2.14.0 Sep 13 00:52:09.575952 ignition[704]: Stage: fetch Sep 13 00:52:09.576129 ignition[704]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:09.576158 ignition[704]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:09.578713 ignition[704]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:09.578884 ignition[704]: parsed url from cmdline: "" Sep 13 00:52:09.578891 ignition[704]: no config URL provided Sep 13 00:52:09.578899 ignition[704]: reading system config file "/usr/lib/ignition/user.ign" Sep 13 00:52:09.578914 ignition[704]: no config at "/usr/lib/ignition/user.ign" Sep 13 00:52:09.578958 ignition[704]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Sep 13 00:52:09.612728 ignition[704]: GET result: OK Sep 13 00:52:09.612872 ignition[704]: parsing config with SHA512: ff548ef5ef99cf02bb8162b9a57026826ea9e04379382f80b6c0e735e8065c91ad7ffcfe83a08fae3c68285d6519027de010d0c0f3ade58a11894db51be41f71 Sep 13 00:52:09.621074 unknown[704]: fetched base config from "system" Sep 13 00:52:09.621730 unknown[704]: fetched base config from "system" Sep 13 00:52:09.622226 unknown[704]: fetched user config from "digitalocean" Sep 13 00:52:09.622987 ignition[704]: fetch: fetch complete Sep 13 00:52:09.623438 ignition[704]: fetch: fetch passed Sep 13 00:52:09.623859 ignition[704]: Ignition finished successfully Sep 13 00:52:09.626072 systemd[1]: Finished ignition-fetch.service. Sep 13 00:52:09.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.627555 systemd[1]: Starting ignition-kargs.service... Sep 13 00:52:09.640708 ignition[714]: Ignition 2.14.0 Sep 13 00:52:09.641394 ignition[714]: Stage: kargs Sep 13 00:52:09.641862 ignition[714]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:09.642362 ignition[714]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:09.644216 ignition[714]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:09.645663 ignition[714]: kargs: kargs passed Sep 13 00:52:09.646081 ignition[714]: Ignition finished successfully Sep 13 00:52:09.647479 systemd[1]: Finished ignition-kargs.service. Sep 13 00:52:09.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.648881 systemd[1]: Starting ignition-disks.service... Sep 13 00:52:09.657392 ignition[719]: Ignition 2.14.0 Sep 13 00:52:09.657402 ignition[719]: Stage: disks Sep 13 00:52:09.657526 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:09.657544 ignition[719]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:09.659291 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:09.660198 ignition[719]: disks: disks passed Sep 13 00:52:09.660244 ignition[719]: Ignition finished successfully Sep 13 00:52:09.661572 systemd[1]: Finished ignition-disks.service. Sep 13 00:52:09.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.662025 systemd[1]: Reached target initrd-root-device.target. Sep 13 00:52:09.662459 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:52:09.663005 systemd[1]: Reached target local-fs.target. Sep 13 00:52:09.663602 systemd[1]: Reached target sysinit.target. Sep 13 00:52:09.664126 systemd[1]: Reached target basic.target. Sep 13 00:52:09.665729 systemd[1]: Starting systemd-fsck-root.service... Sep 13 00:52:09.681452 systemd-fsck[727]: ROOT: clean, 629/553520 files, 56028/553472 blocks Sep 13 00:52:09.684891 systemd[1]: Finished systemd-fsck-root.service. Sep 13 00:52:09.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.686080 systemd[1]: Mounting sysroot.mount... Sep 13 00:52:09.700339 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Sep 13 00:52:09.700679 systemd[1]: Mounted sysroot.mount. Sep 13 00:52:09.701077 systemd[1]: Reached target initrd-root-fs.target. Sep 13 00:52:09.703011 systemd[1]: Mounting sysroot-usr.mount... Sep 13 00:52:09.705468 systemd[1]: Starting flatcar-digitalocean-network.service... Sep 13 00:52:09.709103 systemd[1]: Starting flatcar-metadata-hostname.service... Sep 13 00:52:09.710713 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Sep 13 00:52:09.710744 systemd[1]: Reached target ignition-diskful.target. Sep 13 00:52:09.712183 systemd[1]: Mounted sysroot-usr.mount. Sep 13 00:52:09.714274 systemd[1]: Starting initrd-setup-root.service... Sep 13 00:52:09.720483 initrd-setup-root[739]: cut: /sysroot/etc/passwd: No such file or directory Sep 13 00:52:09.735235 initrd-setup-root[747]: cut: /sysroot/etc/group: No such file or directory Sep 13 00:52:09.745277 initrd-setup-root[757]: cut: /sysroot/etc/shadow: No such file or directory Sep 13 00:52:09.753552 initrd-setup-root[765]: cut: /sysroot/etc/gshadow: No such file or directory Sep 13 00:52:09.822381 systemd[1]: Finished initrd-setup-root.service. Sep 13 00:52:09.823800 systemd[1]: Starting ignition-mount.service... Sep 13 00:52:09.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.826035 systemd[1]: Starting sysroot-boot.service... Sep 13 00:52:09.827215 coreos-metadata[734]: Sep 13 00:52:09.827 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Sep 13 00:52:09.838459 bash[784]: umount: /sysroot/usr/share/oem: not mounted. Sep 13 00:52:09.846977 coreos-metadata[733]: Sep 13 00:52:09.846 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Sep 13 00:52:09.848237 coreos-metadata[734]: Sep 13 00:52:09.848 INFO Fetch successful Sep 13 00:52:09.854906 coreos-metadata[734]: Sep 13 00:52:09.854 INFO wrote hostname ci-3510.3.8-n-de692acfb1 to /sysroot/etc/hostname Sep 13 00:52:09.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.855846 systemd[1]: Finished flatcar-metadata-hostname.service. Sep 13 00:52:09.859207 ignition[786]: INFO : Ignition 2.14.0 Sep 13 00:52:09.859207 ignition[786]: INFO : Stage: mount Sep 13 00:52:09.859207 ignition[786]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:09.859207 ignition[786]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:09.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.862824 systemd[1]: Finished sysroot-boot.service. Sep 13 00:52:09.864101 ignition[786]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:09.865359 coreos-metadata[733]: Sep 13 00:52:09.864 INFO Fetch successful Sep 13 00:52:09.866896 ignition[786]: INFO : mount: mount passed Sep 13 00:52:09.867321 ignition[786]: INFO : Ignition finished successfully Sep 13 00:52:09.869062 systemd[1]: Finished ignition-mount.service. Sep 13 00:52:09.869644 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Sep 13 00:52:09.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.869722 systemd[1]: Finished flatcar-digitalocean-network.service. Sep 13 00:52:09.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:09.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:10.268686 systemd[1]: Mounting sysroot-usr-share-oem.mount... Sep 13 00:52:10.277921 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (794) Sep 13 00:52:10.277979 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Sep 13 00:52:10.277992 kernel: BTRFS info (device vda6): using free space tree Sep 13 00:52:10.278528 kernel: BTRFS info (device vda6): has skinny extents Sep 13 00:52:10.283711 systemd[1]: Mounted sysroot-usr-share-oem.mount. Sep 13 00:52:10.285388 systemd[1]: Starting ignition-files.service... Sep 13 00:52:10.307640 ignition[814]: INFO : Ignition 2.14.0 Sep 13 00:52:10.308292 ignition[814]: INFO : Stage: files Sep 13 00:52:10.308812 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:10.309325 ignition[814]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:10.311968 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:10.314022 ignition[814]: DEBUG : files: compiled without relabeling support, skipping Sep 13 00:52:10.315063 ignition[814]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Sep 13 00:52:10.315652 ignition[814]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Sep 13 00:52:10.320219 ignition[814]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Sep 13 00:52:10.321851 ignition[814]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Sep 13 00:52:10.323605 unknown[814]: wrote ssh authorized keys file for user: core Sep 13 00:52:10.324251 ignition[814]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Sep 13 00:52:10.325371 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Sep 13 00:52:10.326105 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Sep 13 00:52:10.326953 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:52:10.327708 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Sep 13 00:52:10.328288 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:52:10.329178 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:52:10.329959 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:52:10.330736 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Sep 13 00:52:10.770135 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Sep 13 00:52:10.771500 systemd-networkd[689]: eth1: Gained IPv6LL Sep 13 00:52:11.283531 ignition[814]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Sep 13 00:52:11.283531 ignition[814]: INFO : files: op(7): [started] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:52:11.283531 ignition[814]: INFO : files: op(7): [finished] processing unit "coreos-metadata-sshkeys@.service" Sep 13 00:52:11.283531 ignition[814]: INFO : files: op(8): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:52:11.285907 ignition[814]: INFO : files: op(8): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Sep 13 00:52:11.291791 ignition[814]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:52:11.292686 ignition[814]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Sep 13 00:52:11.292686 ignition[814]: INFO : files: files passed Sep 13 00:52:11.292686 ignition[814]: INFO : Ignition finished successfully Sep 13 00:52:11.296411 systemd[1]: Finished ignition-files.service. Sep 13 00:52:11.301327 kernel: kauditd_printk_skb: 27 callbacks suppressed Sep 13 00:52:11.301353 kernel: audit: type=1130 audit(1757724731.296:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.297704 systemd[1]: Starting initrd-setup-root-after-ignition.service... Sep 13 00:52:11.303587 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Sep 13 00:52:11.304570 systemd[1]: Starting ignition-quench.service... Sep 13 00:52:11.308617 systemd[1]: ignition-quench.service: Deactivated successfully. Sep 13 00:52:11.308713 systemd[1]: Finished ignition-quench.service. Sep 13 00:52:11.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.311615 systemd[1]: Finished initrd-setup-root-after-ignition.service. Sep 13 00:52:11.317092 kernel: audit: type=1130 audit(1757724731.309:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.317120 kernel: audit: type=1131 audit(1757724731.309:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.317140 kernel: audit: type=1130 audit(1757724731.314:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.317223 initrd-setup-root-after-ignition[839]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 13 00:52:11.314652 systemd[1]: Reached target ignition-complete.target. Sep 13 00:52:11.318293 systemd[1]: Starting initrd-parse-etc.service... Sep 13 00:52:11.337242 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 13 00:52:11.338117 systemd[1]: Finished initrd-parse-etc.service. Sep 13 00:52:11.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.341513 systemd[1]: Reached target initrd-fs.target. Sep 13 00:52:11.345457 kernel: audit: type=1130 audit(1757724731.338:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.345496 kernel: audit: type=1131 audit(1757724731.341:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.345922 systemd[1]: Reached target initrd.target. Sep 13 00:52:11.346792 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Sep 13 00:52:11.347564 systemd-networkd[689]: eth0: Gained IPv6LL Sep 13 00:52:11.349451 systemd[1]: Starting dracut-pre-pivot.service... Sep 13 00:52:11.362324 systemd[1]: Finished dracut-pre-pivot.service. Sep 13 00:52:11.365329 kernel: audit: type=1130 audit(1757724731.362:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.365504 systemd[1]: Starting initrd-cleanup.service... Sep 13 00:52:11.376493 systemd[1]: Stopped target nss-lookup.target. Sep 13 00:52:11.377395 systemd[1]: Stopped target remote-cryptsetup.target. Sep 13 00:52:11.378221 systemd[1]: Stopped target timers.target. Sep 13 00:52:11.378961 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 13 00:52:11.379530 systemd[1]: Stopped dracut-pre-pivot.service. Sep 13 00:52:11.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.382601 systemd[1]: Stopped target initrd.target. Sep 13 00:52:11.383004 systemd[1]: Stopped target basic.target. Sep 13 00:52:11.383895 kernel: audit: type=1131 audit(1757724731.379:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.383605 systemd[1]: Stopped target ignition-complete.target. Sep 13 00:52:11.384208 systemd[1]: Stopped target ignition-diskful.target. Sep 13 00:52:11.384977 systemd[1]: Stopped target initrd-root-device.target. Sep 13 00:52:11.385701 systemd[1]: Stopped target remote-fs.target. Sep 13 00:52:11.386462 systemd[1]: Stopped target remote-fs-pre.target. Sep 13 00:52:11.387199 systemd[1]: Stopped target sysinit.target. Sep 13 00:52:11.387823 systemd[1]: Stopped target local-fs.target. Sep 13 00:52:11.388368 systemd[1]: Stopped target local-fs-pre.target. Sep 13 00:52:11.388944 systemd[1]: Stopped target swap.target. Sep 13 00:52:11.389522 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 13 00:52:11.392692 kernel: audit: type=1131 audit(1757724731.389:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.389640 systemd[1]: Stopped dracut-pre-mount.service. Sep 13 00:52:11.390212 systemd[1]: Stopped target cryptsetup.target. Sep 13 00:52:11.396225 kernel: audit: type=1131 audit(1757724731.393:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.392995 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 13 00:52:11.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.393129 systemd[1]: Stopped dracut-initqueue.service. Sep 13 00:52:11.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.393727 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 13 00:52:11.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.393828 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Sep 13 00:52:11.396622 systemd[1]: ignition-files.service: Deactivated successfully. Sep 13 00:52:11.396719 systemd[1]: Stopped ignition-files.service. Sep 13 00:52:11.397234 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Sep 13 00:52:11.397341 systemd[1]: Stopped flatcar-metadata-hostname.service. Sep 13 00:52:11.399438 systemd[1]: Stopping ignition-mount.service... Sep 13 00:52:11.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.407989 systemd[1]: Stopping iscsid.service... Sep 13 00:52:11.410563 iscsid[694]: iscsid shutting down. Sep 13 00:52:11.408295 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 13 00:52:11.408461 systemd[1]: Stopped kmod-static-nodes.service. Sep 13 00:52:11.410412 systemd[1]: Stopping sysroot-boot.service... Sep 13 00:52:11.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.412783 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 13 00:52:11.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.413047 systemd[1]: Stopped systemd-udev-trigger.service. Sep 13 00:52:11.413625 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 13 00:52:11.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.413778 systemd[1]: Stopped dracut-pre-trigger.service. Sep 13 00:52:11.416409 systemd[1]: iscsid.service: Deactivated successfully. Sep 13 00:52:11.417051 systemd[1]: Stopped iscsid.service. Sep 13 00:52:11.419035 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 13 00:52:11.419704 systemd[1]: Finished initrd-cleanup.service. Sep 13 00:52:11.422397 systemd[1]: Stopping iscsiuio.service... Sep 13 00:52:11.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.424187 systemd[1]: iscsiuio.service: Deactivated successfully. Sep 13 00:52:11.424283 systemd[1]: Stopped iscsiuio.service. Sep 13 00:52:11.432342 ignition[853]: INFO : Ignition 2.14.0 Sep 13 00:52:11.432342 ignition[853]: INFO : Stage: umount Sep 13 00:52:11.433400 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Sep 13 00:52:11.433400 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Sep 13 00:52:11.442829 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Sep 13 00:52:11.442829 ignition[853]: INFO : umount: umount passed Sep 13 00:52:11.442829 ignition[853]: INFO : Ignition finished successfully Sep 13 00:52:11.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.439091 systemd[1]: sysroot-boot.mount: Deactivated successfully. Sep 13 00:52:11.440176 systemd[1]: ignition-mount.service: Deactivated successfully. Sep 13 00:52:11.440266 systemd[1]: Stopped ignition-mount.service. Sep 13 00:52:11.443535 systemd[1]: ignition-disks.service: Deactivated successfully. Sep 13 00:52:11.443593 systemd[1]: Stopped ignition-disks.service. Sep 13 00:52:11.450011 systemd[1]: ignition-kargs.service: Deactivated successfully. Sep 13 00:52:11.450081 systemd[1]: Stopped ignition-kargs.service. Sep 13 00:52:11.450611 systemd[1]: ignition-fetch.service: Deactivated successfully. Sep 13 00:52:11.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.450649 systemd[1]: Stopped ignition-fetch.service. Sep 13 00:52:11.450951 systemd[1]: Stopped target network.target. Sep 13 00:52:11.453776 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Sep 13 00:52:11.453841 systemd[1]: Stopped ignition-fetch-offline.service. Sep 13 00:52:11.454199 systemd[1]: Stopped target paths.target. Sep 13 00:52:11.454770 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 13 00:52:11.455353 systemd[1]: Stopped systemd-ask-password-console.path. Sep 13 00:52:11.455966 systemd[1]: Stopped target slices.target. Sep 13 00:52:11.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.456530 systemd[1]: Stopped target sockets.target. Sep 13 00:52:11.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.457772 systemd[1]: iscsid.socket: Deactivated successfully. Sep 13 00:52:11.457815 systemd[1]: Closed iscsid.socket. Sep 13 00:52:11.458095 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 13 00:52:11.458122 systemd[1]: Closed iscsiuio.socket. Sep 13 00:52:11.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.458704 systemd[1]: ignition-setup.service: Deactivated successfully. Sep 13 00:52:11.458747 systemd[1]: Stopped ignition-setup.service. Sep 13 00:52:11.460061 systemd[1]: Stopping systemd-networkd.service... Sep 13 00:52:11.460662 systemd[1]: Stopping systemd-resolved.service... Sep 13 00:52:11.464373 systemd-networkd[689]: eth0: DHCPv6 lease lost Sep 13 00:52:11.464677 systemd[1]: sysroot-boot.service: Deactivated successfully. Sep 13 00:52:11.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.464797 systemd[1]: Stopped sysroot-boot.service. Sep 13 00:52:11.465500 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 13 00:52:11.473000 audit: BPF prog-id=6 op=UNLOAD Sep 13 00:52:11.465559 systemd[1]: Stopped initrd-setup-root.service. Sep 13 00:52:11.467496 systemd-networkd[689]: eth1: DHCPv6 lease lost Sep 13 00:52:11.473000 audit: BPF prog-id=9 op=UNLOAD Sep 13 00:52:11.468566 systemd[1]: systemd-networkd.service: Deactivated successfully. Sep 13 00:52:11.468680 systemd[1]: Stopped systemd-networkd.service. Sep 13 00:52:11.470930 systemd[1]: systemd-resolved.service: Deactivated successfully. Sep 13 00:52:11.471025 systemd[1]: Stopped systemd-resolved.service. Sep 13 00:52:11.472482 systemd[1]: systemd-networkd.socket: Deactivated successfully. Sep 13 00:52:11.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.472532 systemd[1]: Closed systemd-networkd.socket. Sep 13 00:52:11.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.474119 systemd[1]: Stopping network-cleanup.service... Sep 13 00:52:11.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.476630 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Sep 13 00:52:11.476692 systemd[1]: Stopped parse-ip-for-networkd.service. Sep 13 00:52:11.477257 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 13 00:52:11.477295 systemd[1]: Stopped systemd-sysctl.service. Sep 13 00:52:11.477992 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 13 00:52:11.478033 systemd[1]: Stopped systemd-modules-load.service. Sep 13 00:52:11.483273 systemd[1]: Stopping systemd-udevd.service... Sep 13 00:52:11.485252 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 13 00:52:11.490244 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 13 00:52:11.490429 systemd[1]: Stopped systemd-udevd.service. Sep 13 00:52:11.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.491554 systemd[1]: network-cleanup.service: Deactivated successfully. Sep 13 00:52:11.491652 systemd[1]: Stopped network-cleanup.service. Sep 13 00:52:11.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.492437 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 13 00:52:11.492475 systemd[1]: Closed systemd-udevd-control.socket. Sep 13 00:52:11.492897 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 13 00:52:11.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.492926 systemd[1]: Closed systemd-udevd-kernel.socket. Sep 13 00:52:11.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.493739 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 13 00:52:11.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.493784 systemd[1]: Stopped dracut-pre-udev.service. Sep 13 00:52:11.494289 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 13 00:52:11.494343 systemd[1]: Stopped dracut-cmdline.service. Sep 13 00:52:11.494951 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 13 00:52:11.494990 systemd[1]: Stopped dracut-cmdline-ask.service. Sep 13 00:52:11.496453 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Sep 13 00:52:11.496928 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 13 00:52:11.497004 systemd[1]: Stopped systemd-vconsole-setup.service. Sep 13 00:52:11.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.506588 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 13 00:52:11.507228 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Sep 13 00:52:11.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:11.508217 systemd[1]: Reached target initrd-switch-root.target. Sep 13 00:52:11.509690 systemd[1]: Starting initrd-switch-root.service... Sep 13 00:52:11.521491 systemd[1]: Switching root. Sep 13 00:52:11.541118 systemd-journald[184]: Journal stopped Sep 13 00:52:14.671816 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Sep 13 00:52:14.671904 kernel: SELinux: Class mctp_socket not defined in policy. Sep 13 00:52:14.671921 kernel: SELinux: Class anon_inode not defined in policy. Sep 13 00:52:14.671935 kernel: SELinux: the above unknown classes and permissions will be allowed Sep 13 00:52:14.671947 kernel: SELinux: policy capability network_peer_controls=1 Sep 13 00:52:14.671959 kernel: SELinux: policy capability open_perms=1 Sep 13 00:52:14.671975 kernel: SELinux: policy capability extended_socket_class=1 Sep 13 00:52:14.671992 kernel: SELinux: policy capability always_check_network=0 Sep 13 00:52:14.672011 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 13 00:52:14.672037 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 13 00:52:14.672053 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 13 00:52:14.672069 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 13 00:52:14.672087 systemd[1]: Successfully loaded SELinux policy in 42.674ms. Sep 13 00:52:14.672116 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.282ms. Sep 13 00:52:14.672142 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 13 00:52:14.678805 systemd[1]: Detected virtualization kvm. Sep 13 00:52:14.678857 systemd[1]: Detected architecture x86-64. Sep 13 00:52:14.678872 systemd[1]: Detected first boot. Sep 13 00:52:14.678886 systemd[1]: Hostname set to . Sep 13 00:52:14.678906 systemd[1]: Initializing machine ID from VM UUID. Sep 13 00:52:14.678920 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Sep 13 00:52:14.678940 systemd[1]: Populated /etc with preset unit settings. Sep 13 00:52:14.678953 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:14.678969 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:14.678983 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:14.678997 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 13 00:52:14.679434 systemd[1]: Stopped initrd-switch-root.service. Sep 13 00:52:14.684417 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 13 00:52:14.684443 systemd[1]: Created slice system-addon\x2dconfig.slice. Sep 13 00:52:14.684457 systemd[1]: Created slice system-addon\x2drun.slice. Sep 13 00:52:14.684471 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Sep 13 00:52:14.684483 systemd[1]: Created slice system-getty.slice. Sep 13 00:52:14.684497 systemd[1]: Created slice system-modprobe.slice. Sep 13 00:52:14.684510 systemd[1]: Created slice system-serial\x2dgetty.slice. Sep 13 00:52:14.684534 systemd[1]: Created slice system-system\x2dcloudinit.slice. Sep 13 00:52:14.684557 systemd[1]: Created slice system-systemd\x2dfsck.slice. Sep 13 00:52:14.684576 systemd[1]: Created slice user.slice. Sep 13 00:52:14.684593 systemd[1]: Started systemd-ask-password-console.path. Sep 13 00:52:14.688063 systemd[1]: Started systemd-ask-password-wall.path. Sep 13 00:52:14.688093 systemd[1]: Set up automount boot.automount. Sep 13 00:52:14.688108 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Sep 13 00:52:14.688127 systemd[1]: Stopped target initrd-switch-root.target. Sep 13 00:52:14.688139 systemd[1]: Stopped target initrd-fs.target. Sep 13 00:52:14.688152 systemd[1]: Stopped target initrd-root-fs.target. Sep 13 00:52:14.688165 systemd[1]: Reached target integritysetup.target. Sep 13 00:52:14.688177 systemd[1]: Reached target remote-cryptsetup.target. Sep 13 00:52:14.688190 systemd[1]: Reached target remote-fs.target. Sep 13 00:52:14.688202 systemd[1]: Reached target slices.target. Sep 13 00:52:14.688215 systemd[1]: Reached target swap.target. Sep 13 00:52:14.688228 systemd[1]: Reached target torcx.target. Sep 13 00:52:14.688240 systemd[1]: Reached target veritysetup.target. Sep 13 00:52:14.688255 systemd[1]: Listening on systemd-coredump.socket. Sep 13 00:52:14.688268 systemd[1]: Listening on systemd-initctl.socket. Sep 13 00:52:14.688280 systemd[1]: Listening on systemd-networkd.socket. Sep 13 00:52:14.688293 systemd[1]: Listening on systemd-udevd-control.socket. Sep 13 00:52:14.688314 systemd[1]: Listening on systemd-udevd-kernel.socket. Sep 13 00:52:14.688327 systemd[1]: Listening on systemd-userdbd.socket. Sep 13 00:52:14.688339 systemd[1]: Mounting dev-hugepages.mount... Sep 13 00:52:14.688351 systemd[1]: Mounting dev-mqueue.mount... Sep 13 00:52:14.688365 systemd[1]: Mounting media.mount... Sep 13 00:52:14.688380 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:14.688393 systemd[1]: Mounting sys-kernel-debug.mount... Sep 13 00:52:14.688405 systemd[1]: Mounting sys-kernel-tracing.mount... Sep 13 00:52:14.688418 systemd[1]: Mounting tmp.mount... Sep 13 00:52:14.688434 systemd[1]: Starting flatcar-tmpfiles.service... Sep 13 00:52:14.688446 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:14.688459 systemd[1]: Starting kmod-static-nodes.service... Sep 13 00:52:14.688471 systemd[1]: Starting modprobe@configfs.service... Sep 13 00:52:14.688484 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:52:14.688498 systemd[1]: Starting modprobe@drm.service... Sep 13 00:52:14.688511 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:52:14.688524 systemd[1]: Starting modprobe@fuse.service... Sep 13 00:52:14.688542 systemd[1]: Starting modprobe@loop.service... Sep 13 00:52:14.688562 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:52:14.688579 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 13 00:52:14.688592 systemd[1]: Stopped systemd-fsck-root.service. Sep 13 00:52:14.688604 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 13 00:52:14.688616 systemd[1]: Stopped systemd-fsck-usr.service. Sep 13 00:52:14.688631 systemd[1]: Stopped systemd-journald.service. Sep 13 00:52:14.688644 systemd[1]: Starting systemd-journald.service... Sep 13 00:52:14.688656 systemd[1]: Starting systemd-modules-load.service... Sep 13 00:52:14.688669 systemd[1]: Starting systemd-network-generator.service... Sep 13 00:52:14.688682 systemd[1]: Starting systemd-remount-fs.service... Sep 13 00:52:14.688694 systemd[1]: Starting systemd-udev-trigger.service... Sep 13 00:52:14.688707 systemd[1]: verity-setup.service: Deactivated successfully. Sep 13 00:52:14.688722 systemd[1]: Stopped verity-setup.service. Sep 13 00:52:14.688735 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:14.688750 systemd[1]: Mounted dev-hugepages.mount. Sep 13 00:52:14.688762 systemd[1]: Mounted dev-mqueue.mount. Sep 13 00:52:14.688774 systemd[1]: Mounted media.mount. Sep 13 00:52:14.688787 systemd[1]: Mounted sys-kernel-debug.mount. Sep 13 00:52:14.688800 systemd[1]: Mounted sys-kernel-tracing.mount. Sep 13 00:52:14.688812 systemd[1]: Mounted tmp.mount. Sep 13 00:52:14.688825 systemd[1]: Finished kmod-static-nodes.service. Sep 13 00:52:14.688837 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 13 00:52:14.688849 systemd[1]: Finished modprobe@configfs.service. Sep 13 00:52:14.692388 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:52:14.692412 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:52:14.692427 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:52:14.692440 systemd[1]: Finished modprobe@drm.service. Sep 13 00:52:14.692452 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:52:14.692468 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:52:14.692480 systemd[1]: Finished systemd-modules-load.service. Sep 13 00:52:14.692494 systemd[1]: Finished systemd-network-generator.service. Sep 13 00:52:14.692506 systemd[1]: Finished systemd-remount-fs.service. Sep 13 00:52:14.692519 systemd[1]: Reached target network-pre.target. Sep 13 00:52:14.692531 systemd[1]: Mounting sys-kernel-config.mount... Sep 13 00:52:14.692543 kernel: fuse: init (API version 7.34) Sep 13 00:52:14.692559 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:52:14.692571 kernel: loop: module loaded Sep 13 00:52:14.692586 systemd[1]: Starting systemd-hwdb-update.service... Sep 13 00:52:14.692599 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:52:14.692611 systemd[1]: Starting systemd-random-seed.service... Sep 13 00:52:14.692623 systemd[1]: Starting systemd-sysctl.service... Sep 13 00:52:14.692637 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:52:14.692649 systemd[1]: Finished modprobe@loop.service. Sep 13 00:52:14.692662 systemd[1]: Mounted sys-kernel-config.mount. Sep 13 00:52:14.692675 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:52:14.692697 systemd-journald[955]: Journal started Sep 13 00:52:14.692763 systemd-journald[955]: Runtime Journal (/run/log/journal/2c1e8b43281a41cc9ed289b42eadcdda) is 4.9M, max 39.5M, 34.5M free. Sep 13 00:52:11.674000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 13 00:52:11.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:52:11.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Sep 13 00:52:11.730000 audit: BPF prog-id=10 op=LOAD Sep 13 00:52:11.730000 audit: BPF prog-id=10 op=UNLOAD Sep 13 00:52:11.730000 audit: BPF prog-id=11 op=LOAD Sep 13 00:52:11.730000 audit: BPF prog-id=11 op=UNLOAD Sep 13 00:52:11.825000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Sep 13 00:52:11.825000 audit[885]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d4 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.825000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:52:11.826000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Sep 13 00:52:11.826000 audit[885]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:11.826000 audit: CWD cwd="/" Sep 13 00:52:11.826000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:11.826000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:11.826000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Sep 13 00:52:14.494000 audit: BPF prog-id=12 op=LOAD Sep 13 00:52:14.494000 audit: BPF prog-id=3 op=UNLOAD Sep 13 00:52:14.494000 audit: BPF prog-id=13 op=LOAD Sep 13 00:52:14.494000 audit: BPF prog-id=14 op=LOAD Sep 13 00:52:14.494000 audit: BPF prog-id=4 op=UNLOAD Sep 13 00:52:14.494000 audit: BPF prog-id=5 op=UNLOAD Sep 13 00:52:14.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.501000 audit: BPF prog-id=12 op=UNLOAD Sep 13 00:52:14.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.699895 systemd[1]: Started systemd-journald.service. Sep 13 00:52:14.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.595000 audit: BPF prog-id=15 op=LOAD Sep 13 00:52:14.595000 audit: BPF prog-id=16 op=LOAD Sep 13 00:52:14.595000 audit: BPF prog-id=17 op=LOAD Sep 13 00:52:14.595000 audit: BPF prog-id=13 op=UNLOAD Sep 13 00:52:14.595000 audit: BPF prog-id=14 op=UNLOAD Sep 13 00:52:14.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.660000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Sep 13 00:52:14.660000 audit[955]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe4d8e1f70 a2=4000 a3=7ffe4d8e200c items=0 ppid=1 pid=955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:14.660000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Sep 13 00:52:14.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.492052 systemd[1]: Queued start job for default target multi-user.target. Sep 13 00:52:11.822377 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:14.492070 systemd[1]: Unnecessary job was removed for dev-vda6.device. Sep 13 00:52:11.822975 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:52:14.495368 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 13 00:52:11.822999 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:52:14.697647 systemd[1]: Starting systemd-journal-flush.service... Sep 13 00:52:11.823038 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Sep 13 00:52:14.700121 systemd[1]: Finished systemd-random-seed.service. Sep 13 00:52:11.823049 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Sep 13 00:52:14.700873 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 13 00:52:11.823090 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Sep 13 00:52:14.701001 systemd[1]: Finished modprobe@fuse.service. Sep 13 00:52:11.823105 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Sep 13 00:52:14.701464 systemd[1]: Reached target first-boot-complete.target. Sep 13 00:52:11.823421 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Sep 13 00:52:14.703340 systemd[1]: Mounting sys-fs-fuse-connections.mount... Sep 13 00:52:11.823473 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Sep 13 00:52:14.712414 systemd-journald[955]: Time spent on flushing to /var/log/journal/2c1e8b43281a41cc9ed289b42eadcdda is 39.214ms for 1109 entries. Sep 13 00:52:14.712414 systemd-journald[955]: System Journal (/var/log/journal/2c1e8b43281a41cc9ed289b42eadcdda) is 8.0M, max 195.6M, 187.6M free. Sep 13 00:52:14.767242 systemd-journald[955]: Received client request to flush runtime journal. Sep 13 00:52:14.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.707054 systemd[1]: Mounted sys-fs-fuse-connections.mount. Sep 13 00:52:11.823489 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Sep 13 00:52:14.722015 systemd[1]: Finished systemd-sysctl.service. Sep 13 00:52:11.824801 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Sep 13 00:52:14.755811 systemd[1]: Finished systemd-udev-trigger.service. Sep 13 00:52:11.824843 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Sep 13 00:52:14.757443 systemd[1]: Starting systemd-udev-settle.service... Sep 13 00:52:11.824867 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Sep 13 00:52:14.768178 systemd[1]: Finished systemd-journal-flush.service. Sep 13 00:52:11.824885 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Sep 13 00:52:11.824909 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Sep 13 00:52:11.824925 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Sep 13 00:52:14.051510 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:52:14.051845 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:52:14.052083 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:52:14.052586 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Sep 13 00:52:14.052673 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Sep 13 00:52:14.052773 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2025-09-13T00:52:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Sep 13 00:52:14.773016 udevadm[990]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 13 00:52:14.777579 systemd[1]: Finished flatcar-tmpfiles.service. Sep 13 00:52:14.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:14.779218 systemd[1]: Starting systemd-sysusers.service... Sep 13 00:52:14.803193 systemd[1]: Finished systemd-sysusers.service. Sep 13 00:52:14.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.311289 systemd[1]: Finished systemd-hwdb-update.service. Sep 13 00:52:15.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.312000 audit: BPF prog-id=18 op=LOAD Sep 13 00:52:15.312000 audit: BPF prog-id=19 op=LOAD Sep 13 00:52:15.312000 audit: BPF prog-id=7 op=UNLOAD Sep 13 00:52:15.312000 audit: BPF prog-id=8 op=UNLOAD Sep 13 00:52:15.313359 systemd[1]: Starting systemd-udevd.service... Sep 13 00:52:15.333027 systemd-udevd[998]: Using default interface naming scheme 'v252'. Sep 13 00:52:15.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.356000 audit: BPF prog-id=20 op=LOAD Sep 13 00:52:15.354804 systemd[1]: Started systemd-udevd.service. Sep 13 00:52:15.357317 systemd[1]: Starting systemd-networkd.service... Sep 13 00:52:15.362000 audit: BPF prog-id=21 op=LOAD Sep 13 00:52:15.363000 audit: BPF prog-id=22 op=LOAD Sep 13 00:52:15.363000 audit: BPF prog-id=23 op=LOAD Sep 13 00:52:15.364283 systemd[1]: Starting systemd-userdbd.service... Sep 13 00:52:15.405179 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Sep 13 00:52:15.410915 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:15.411123 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:15.412539 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:52:15.414524 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:52:15.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.419597 systemd[1]: Starting modprobe@loop.service... Sep 13 00:52:15.419959 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 13 00:52:15.420032 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 13 00:52:15.420122 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:15.420562 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:52:15.420701 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:52:15.421290 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:52:15.421414 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:52:15.421947 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:52:15.422052 systemd[1]: Finished modprobe@loop.service. Sep 13 00:52:15.425558 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:52:15.425607 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:52:15.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.435809 systemd[1]: Started systemd-userdbd.service. Sep 13 00:52:15.507639 systemd-networkd[1005]: lo: Link UP Sep 13 00:52:15.507649 systemd-networkd[1005]: lo: Gained carrier Sep 13 00:52:15.508133 systemd-networkd[1005]: Enumeration completed Sep 13 00:52:15.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.508242 systemd[1]: Started systemd-networkd.service. Sep 13 00:52:15.509638 systemd-networkd[1005]: eth1: Configuring with /run/systemd/network/10-5e:58:32:8a:ce:7d.network. Sep 13 00:52:15.510574 systemd-networkd[1005]: eth0: Configuring with /run/systemd/network/10-86:44:4c:6e:e3:3a.network. Sep 13 00:52:15.511205 systemd-networkd[1005]: eth1: Link UP Sep 13 00:52:15.511214 systemd-networkd[1005]: eth1: Gained carrier Sep 13 00:52:15.515594 systemd-networkd[1005]: eth0: Link UP Sep 13 00:52:15.515604 systemd-networkd[1005]: eth0: Gained carrier Sep 13 00:52:15.540329 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Sep 13 00:52:15.533000 audit[1008]: AVC avc: denied { confidentiality } for pid=1008 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Sep 13 00:52:15.533000 audit[1008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564f77b624d0 a1=338ec a2=7f6609441bc5 a3=5 items=110 ppid=998 pid=1008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:15.533000 audit: CWD cwd="/" Sep 13 00:52:15.533000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=1 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=2 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=3 name=(null) inode=13209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=4 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=5 name=(null) inode=13210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=6 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=7 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=8 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=9 name=(null) inode=13212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=10 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=11 name=(null) inode=13213 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=12 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=13 name=(null) inode=13214 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=14 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=15 name=(null) inode=13215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=16 name=(null) inode=13211 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=17 name=(null) inode=13216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=18 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=19 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=20 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=21 name=(null) inode=13218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=22 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=23 name=(null) inode=13219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=24 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=25 name=(null) inode=13220 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=26 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=27 name=(null) inode=13221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=28 name=(null) inode=13217 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=29 name=(null) inode=13222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=30 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=31 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=32 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=33 name=(null) inode=13224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=34 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=35 name=(null) inode=13225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=36 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=37 name=(null) inode=13226 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=38 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=39 name=(null) inode=13227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=40 name=(null) inode=13223 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=41 name=(null) inode=13228 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=42 name=(null) inode=13208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=43 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=44 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=45 name=(null) inode=13230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=46 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=47 name=(null) inode=13231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=48 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=49 name=(null) inode=13232 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=50 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=51 name=(null) inode=13233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=52 name=(null) inode=13229 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=53 name=(null) inode=13234 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=55 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=56 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=57 name=(null) inode=13236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=58 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=59 name=(null) inode=13237 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=60 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=61 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=62 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=63 name=(null) inode=13239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=64 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=65 name=(null) inode=13240 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=66 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=67 name=(null) inode=13241 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=68 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=69 name=(null) inode=13242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=70 name=(null) inode=13238 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=71 name=(null) inode=13243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=72 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=73 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=74 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=75 name=(null) inode=13245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=76 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=77 name=(null) inode=13246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=78 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=79 name=(null) inode=13247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=80 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=81 name=(null) inode=13248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=82 name=(null) inode=13244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=83 name=(null) inode=13249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=84 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=85 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=86 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=87 name=(null) inode=13251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=88 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=89 name=(null) inode=13252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=90 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=91 name=(null) inode=13253 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=92 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=93 name=(null) inode=13254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=94 name=(null) inode=13250 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=95 name=(null) inode=13255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=96 name=(null) inode=13235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=97 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=98 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=99 name=(null) inode=13257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=100 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=101 name=(null) inode=13258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=102 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=103 name=(null) inode=13259 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=104 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=105 name=(null) inode=13260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=106 name=(null) inode=13256 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=107 name=(null) inode=13261 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PATH item=109 name=(null) inode=13262 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:15.533000 audit: PROCTITLE proctitle="(udev-worker)" Sep 13 00:52:15.564344 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Sep 13 00:52:15.565068 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Sep 13 00:52:15.573332 kernel: ACPI: button: Power Button [PWRF] Sep 13 00:52:15.583319 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Sep 13 00:52:15.596336 kernel: mousedev: PS/2 mouse device common for all mice Sep 13 00:52:15.711338 kernel: EDAC MC: Ver: 3.0.0 Sep 13 00:52:15.736776 systemd[1]: Finished systemd-udev-settle.service. Sep 13 00:52:15.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.738513 systemd[1]: Starting lvm2-activation-early.service... Sep 13 00:52:15.754329 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:52:15.781589 systemd[1]: Finished lvm2-activation-early.service. Sep 13 00:52:15.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.782105 systemd[1]: Reached target cryptsetup.target. Sep 13 00:52:15.783708 systemd[1]: Starting lvm2-activation.service... Sep 13 00:52:15.788706 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 13 00:52:15.812665 systemd[1]: Finished lvm2-activation.service. Sep 13 00:52:15.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.813256 systemd[1]: Reached target local-fs-pre.target. Sep 13 00:52:15.815507 systemd[1]: Mounting media-configdrive.mount... Sep 13 00:52:15.815871 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 13 00:52:15.815913 systemd[1]: Reached target machines.target. Sep 13 00:52:15.817236 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Sep 13 00:52:15.829223 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Sep 13 00:52:15.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.831322 kernel: ISO 9660 Extensions: RRIP_1991A Sep 13 00:52:15.832826 systemd[1]: Mounted media-configdrive.mount. Sep 13 00:52:15.833240 systemd[1]: Reached target local-fs.target. Sep 13 00:52:15.835168 systemd[1]: Starting ldconfig.service... Sep 13 00:52:15.836261 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:52:15.836333 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:15.838667 systemd[1]: Starting systemd-boot-update.service... Sep 13 00:52:15.842316 systemd[1]: Starting systemd-machine-id-commit.service... Sep 13 00:52:15.845430 systemd[1]: Starting systemd-sysext.service... Sep 13 00:52:15.847854 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Sep 13 00:52:15.850047 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Sep 13 00:52:15.864613 systemd[1]: Unmounting usr-share-oem.mount... Sep 13 00:52:15.876452 systemd[1]: usr-share-oem.mount: Deactivated successfully. Sep 13 00:52:15.876692 systemd[1]: Unmounted usr-share-oem.mount. Sep 13 00:52:15.885720 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 13 00:52:15.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.886523 systemd[1]: Finished systemd-machine-id-commit.service. Sep 13 00:52:15.896444 kernel: loop0: detected capacity change from 0 to 224512 Sep 13 00:52:15.932337 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 13 00:52:15.965339 kernel: loop1: detected capacity change from 0 to 224512 Sep 13 00:52:15.966753 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Sep 13 00:52:15.966753 systemd-fsck[1050]: /dev/vda1: 790 files, 120761/258078 clusters Sep 13 00:52:15.971844 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Sep 13 00:52:15.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:15.973614 systemd[1]: Mounting boot.mount... Sep 13 00:52:15.985215 (sd-sysext)[1053]: Using extensions 'kubernetes'. Sep 13 00:52:15.987462 (sd-sysext)[1053]: Merged extensions into '/usr'. Sep 13 00:52:15.999647 systemd[1]: Mounted boot.mount. Sep 13 00:52:16.019769 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:16.021659 systemd[1]: Mounting usr-share-oem.mount... Sep 13 00:52:16.022288 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.024016 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:52:16.027980 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:52:16.030118 systemd[1]: Starting modprobe@loop.service... Sep 13 00:52:16.030577 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.030713 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.030889 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:16.031973 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:52:16.032139 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:52:16.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.034864 systemd[1]: Finished systemd-boot-update.service. Sep 13 00:52:16.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.036524 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:52:16.036652 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:52:16.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.037221 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:52:16.039736 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:52:16.039877 systemd[1]: Finished modprobe@loop.service. Sep 13 00:52:16.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.040498 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.042679 systemd[1]: Mounted usr-share-oem.mount. Sep 13 00:52:16.045926 systemd[1]: Finished systemd-sysext.service. Sep 13 00:52:16.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.048233 systemd[1]: Starting ensure-sysext.service... Sep 13 00:52:16.050862 systemd[1]: Starting systemd-tmpfiles-setup.service... Sep 13 00:52:16.059150 systemd[1]: Reloading. Sep 13 00:52:16.088510 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Sep 13 00:52:16.098045 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 13 00:52:16.106780 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 13 00:52:16.147884 /usr/lib/systemd/system-generators/torcx-generator[1081]: time="2025-09-13T00:52:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:16.147913 /usr/lib/systemd/system-generators/torcx-generator[1081]: time="2025-09-13T00:52:16Z" level=info msg="torcx already run" Sep 13 00:52:16.214407 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 13 00:52:16.272622 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:16.272644 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:16.297379 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:16.360000 audit: BPF prog-id=24 op=LOAD Sep 13 00:52:16.362255 kernel: kauditd_printk_skb: 241 callbacks suppressed Sep 13 00:52:16.362383 kernel: audit: type=1334 audit(1757724736.360:167): prog-id=24 op=LOAD Sep 13 00:52:16.364766 kernel: audit: type=1334 audit(1757724736.361:168): prog-id=25 op=LOAD Sep 13 00:52:16.364865 kernel: audit: type=1334 audit(1757724736.361:169): prog-id=18 op=UNLOAD Sep 13 00:52:16.364888 kernel: audit: type=1334 audit(1757724736.362:170): prog-id=19 op=UNLOAD Sep 13 00:52:16.361000 audit: BPF prog-id=25 op=LOAD Sep 13 00:52:16.361000 audit: BPF prog-id=18 op=UNLOAD Sep 13 00:52:16.362000 audit: BPF prog-id=19 op=UNLOAD Sep 13 00:52:16.365796 kernel: audit: type=1334 audit(1757724736.364:171): prog-id=26 op=LOAD Sep 13 00:52:16.364000 audit: BPF prog-id=26 op=LOAD Sep 13 00:52:16.366660 kernel: audit: type=1334 audit(1757724736.364:172): prog-id=15 op=UNLOAD Sep 13 00:52:16.364000 audit: BPF prog-id=15 op=UNLOAD Sep 13 00:52:16.367674 kernel: audit: type=1334 audit(1757724736.364:173): prog-id=27 op=LOAD Sep 13 00:52:16.364000 audit: BPF prog-id=27 op=LOAD Sep 13 00:52:16.368513 kernel: audit: type=1334 audit(1757724736.364:174): prog-id=28 op=LOAD Sep 13 00:52:16.364000 audit: BPF prog-id=28 op=LOAD Sep 13 00:52:16.369361 kernel: audit: type=1334 audit(1757724736.364:175): prog-id=16 op=UNLOAD Sep 13 00:52:16.364000 audit: BPF prog-id=16 op=UNLOAD Sep 13 00:52:16.370324 kernel: audit: type=1334 audit(1757724736.364:176): prog-id=17 op=UNLOAD Sep 13 00:52:16.364000 audit: BPF prog-id=17 op=UNLOAD Sep 13 00:52:16.366000 audit: BPF prog-id=29 op=LOAD Sep 13 00:52:16.366000 audit: BPF prog-id=20 op=UNLOAD Sep 13 00:52:16.367000 audit: BPF prog-id=30 op=LOAD Sep 13 00:52:16.367000 audit: BPF prog-id=21 op=UNLOAD Sep 13 00:52:16.368000 audit: BPF prog-id=31 op=LOAD Sep 13 00:52:16.368000 audit: BPF prog-id=32 op=LOAD Sep 13 00:52:16.368000 audit: BPF prog-id=22 op=UNLOAD Sep 13 00:52:16.368000 audit: BPF prog-id=23 op=UNLOAD Sep 13 00:52:16.381718 systemd[1]: Finished ldconfig.service. Sep 13 00:52:16.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.384137 systemd[1]: Finished systemd-tmpfiles-setup.service. Sep 13 00:52:16.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.389996 systemd[1]: Starting audit-rules.service... Sep 13 00:52:16.392767 systemd[1]: Starting clean-ca-certificates.service... Sep 13 00:52:16.395593 systemd[1]: Starting systemd-journal-catalog-update.service... Sep 13 00:52:16.400000 audit: BPF prog-id=33 op=LOAD Sep 13 00:52:16.402000 audit: BPF prog-id=34 op=LOAD Sep 13 00:52:16.401694 systemd[1]: Starting systemd-resolved.service... Sep 13 00:52:16.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.404246 systemd[1]: Starting systemd-timesyncd.service... Sep 13 00:52:16.407273 systemd[1]: Starting systemd-update-utmp.service... Sep 13 00:52:16.408506 systemd[1]: Finished clean-ca-certificates.service. Sep 13 00:52:16.412017 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:52:16.419529 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.422338 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:52:16.426804 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:52:16.430842 systemd[1]: Starting modprobe@loop.service... Sep 13 00:52:16.431348 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.431563 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.431754 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:52:16.432777 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:52:16.432966 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:52:16.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.437518 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:52:16.437662 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:52:16.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.438509 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:52:16.440253 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.443631 systemd[1]: Starting modprobe@dm_mod.service... Sep 13 00:52:16.446470 systemd[1]: Starting modprobe@efi_pstore.service... Sep 13 00:52:16.447552 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.447766 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.447971 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:52:16.451000 audit[1135]: SYSTEM_BOOT pid=1135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.456739 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.459675 systemd[1]: Starting modprobe@drm.service... Sep 13 00:52:16.460602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.460945 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.463814 systemd[1]: Starting systemd-networkd-wait-online.service... Sep 13 00:52:16.464928 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 13 00:52:16.466490 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 13 00:52:16.468027 systemd[1]: Finished modprobe@loop.service. Sep 13 00:52:16.470578 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 13 00:52:16.470711 systemd[1]: Finished modprobe@dm_mod.service. Sep 13 00:52:16.471538 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 13 00:52:16.471658 systemd[1]: Finished modprobe@efi_pstore.service. Sep 13 00:52:16.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.472729 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 13 00:52:16.472887 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.474232 systemd[1]: Finished ensure-sysext.service. Sep 13 00:52:16.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.477729 systemd[1]: Finished systemd-update-utmp.service. Sep 13 00:52:16.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.481750 systemd[1]: Finished systemd-journal-catalog-update.service. Sep 13 00:52:16.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.483727 systemd[1]: Starting systemd-update-done.service... Sep 13 00:52:16.484519 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 13 00:52:16.484689 systemd[1]: Finished modprobe@drm.service. Sep 13 00:52:16.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.501440 systemd[1]: Finished systemd-update-done.service. Sep 13 00:52:16.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:16.523516 augenrules[1157]: No rules Sep 13 00:52:16.523000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Sep 13 00:52:16.523000 audit[1157]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcda752240 a2=420 a3=0 items=0 ppid=1129 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:16.523000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Sep 13 00:52:16.524953 systemd[1]: Finished audit-rules.service. Sep 13 00:52:16.533331 systemd[1]: Started systemd-timesyncd.service. Sep 13 00:52:16.533802 systemd[1]: Reached target time-set.target. Sep 13 00:52:16.547416 systemd-resolved[1133]: Positive Trust Anchors: Sep 13 00:52:16.547787 systemd-resolved[1133]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 13 00:52:16.547892 systemd-resolved[1133]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Sep 13 00:52:16.554242 systemd-resolved[1133]: Using system hostname 'ci-3510.3.8-n-de692acfb1'. Sep 13 00:52:16.556789 systemd[1]: Started systemd-resolved.service. Sep 13 00:52:16.557243 systemd[1]: Reached target network.target. Sep 13 00:52:16.557550 systemd[1]: Reached target nss-lookup.target. Sep 13 00:52:16.557841 systemd[1]: Reached target sysinit.target. Sep 13 00:52:16.558211 systemd[1]: Started motdgen.path. Sep 13 00:52:16.558526 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Sep 13 00:52:16.559059 systemd[1]: Started logrotate.timer. Sep 13 00:52:16.559497 systemd[1]: Started mdadm.timer. Sep 13 00:52:16.559809 systemd[1]: Started systemd-tmpfiles-clean.timer. Sep 13 00:52:16.560123 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 13 00:52:16.560161 systemd[1]: Reached target paths.target. Sep 13 00:52:16.560499 systemd[1]: Reached target timers.target. Sep 13 00:52:16.561167 systemd[1]: Listening on dbus.socket. Sep 13 00:52:16.562817 systemd[1]: Starting docker.socket... Sep 13 00:52:16.566845 systemd[1]: Listening on sshd.socket. Sep 13 00:52:16.567630 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.568260 systemd[1]: Listening on docker.socket. Sep 13 00:52:16.568838 systemd[1]: Reached target sockets.target. Sep 13 00:52:16.569214 systemd[1]: Reached target basic.target. Sep 13 00:52:16.569556 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.569580 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Sep 13 00:52:16.570908 systemd[1]: Starting containerd.service... Sep 13 00:52:16.572719 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Sep 13 00:52:16.575992 systemd[1]: Starting dbus.service... Sep 13 00:52:16.578942 systemd[1]: Starting enable-oem-cloudinit.service... Sep 13 00:52:16.584826 systemd[1]: Starting extend-filesystems.service... Sep 13 00:52:16.586593 jq[1170]: false Sep 13 00:52:16.585288 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Sep 13 00:52:16.587591 systemd[1]: Starting motdgen.service... Sep 13 00:52:16.591317 systemd[1]: Starting ssh-key-proc-cmdline.service... Sep 13 00:52:16.593111 systemd[1]: Starting sshd-keygen.service... Sep 13 00:52:16.595560 systemd-networkd[1005]: eth1: Gained IPv6LL Sep 13 00:52:16.599819 systemd[1]: Starting systemd-logind.service... Sep 13 00:52:16.600381 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 13 00:52:16.600553 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Sep 13 00:52:16.601240 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 13 00:52:16.604573 systemd[1]: Starting update-engine.service... Sep 13 00:52:16.607323 systemd[1]: Starting update-ssh-keys-after-ignition.service... Sep 13 00:52:16.609317 systemd[1]: Finished systemd-networkd-wait-online.service. Sep 13 00:52:16.611228 jq[1180]: true Sep 13 00:52:16.614135 systemd-timesyncd[1134]: Contacted time server 15.204.246.57:123 (0.flatcar.pool.ntp.org). Sep 13 00:52:16.614191 systemd-timesyncd[1134]: Initial clock synchronization to Sat 2025-09-13 00:52:16.465696 UTC. Sep 13 00:52:16.616612 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 13 00:52:16.616885 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Sep 13 00:52:16.617641 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 13 00:52:16.617792 systemd[1]: Finished ssh-key-proc-cmdline.service. Sep 13 00:52:16.619868 systemd[1]: Reached target network-online.target. Sep 13 00:52:16.622944 systemd[1]: Starting kubelet.service... Sep 13 00:52:16.651871 dbus-daemon[1167]: [system] SELinux support is enabled Sep 13 00:52:16.652414 systemd[1]: Started dbus.service. Sep 13 00:52:16.655517 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 13 00:52:16.655557 systemd[1]: Reached target system-config.target. Sep 13 00:52:16.655951 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 13 00:52:16.655983 systemd[1]: Reached target user-config.target. Sep 13 00:52:16.661462 systemd-networkd[1005]: eth0: Gained IPv6LL Sep 13 00:52:16.663533 jq[1186]: true Sep 13 00:52:16.682161 extend-filesystems[1171]: Found loop1 Sep 13 00:52:16.683485 extend-filesystems[1171]: Found vda Sep 13 00:52:16.685438 extend-filesystems[1171]: Found vda1 Sep 13 00:52:16.685569 systemd[1]: motdgen.service: Deactivated successfully. Sep 13 00:52:16.685797 systemd[1]: Finished motdgen.service. Sep 13 00:52:16.686803 extend-filesystems[1171]: Found vda2 Sep 13 00:52:16.689349 extend-filesystems[1171]: Found vda3 Sep 13 00:52:16.689850 extend-filesystems[1171]: Found usr Sep 13 00:52:16.690486 extend-filesystems[1171]: Found vda4 Sep 13 00:52:16.692930 extend-filesystems[1171]: Found vda6 Sep 13 00:52:16.694589 extend-filesystems[1171]: Found vda7 Sep 13 00:52:16.725546 extend-filesystems[1171]: Found vda9 Sep 13 00:52:16.725546 extend-filesystems[1171]: Checking size of /dev/vda9 Sep 13 00:52:16.749533 extend-filesystems[1171]: Resized partition /dev/vda9 Sep 13 00:52:16.754594 update_engine[1178]: I0913 00:52:16.753675 1178 main.cc:92] Flatcar Update Engine starting Sep 13 00:52:16.758928 extend-filesystems[1217]: resize2fs 1.46.5 (30-Dec-2021) Sep 13 00:52:16.761844 systemd[1]: Started update-engine.service. Sep 13 00:52:16.764408 systemd[1]: Started locksmithd.service. Sep 13 00:52:16.767924 update_engine[1178]: I0913 00:52:16.765897 1178 update_check_scheduler.cc:74] Next update check in 9m25s Sep 13 00:52:16.770318 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Sep 13 00:52:16.770852 bash[1218]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:52:16.771747 systemd[1]: Finished update-ssh-keys-after-ignition.service. Sep 13 00:52:16.815760 env[1189]: time="2025-09-13T00:52:16.815701057Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Sep 13 00:52:16.833329 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:16.833362 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 13 00:52:16.854754 systemd-logind[1175]: Watching system buttons on /dev/input/event1 (Power Button) Sep 13 00:52:16.854781 systemd-logind[1175]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Sep 13 00:52:16.859332 systemd-logind[1175]: New seat seat0. Sep 13 00:52:16.866473 systemd[1]: Started systemd-logind.service. Sep 13 00:52:16.884395 env[1189]: time="2025-09-13T00:52:16.883842818Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 13 00:52:16.884395 env[1189]: time="2025-09-13T00:52:16.884048845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.889848 coreos-metadata[1166]: Sep 13 00:52:16.889 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Sep 13 00:52:16.893879 env[1189]: time="2025-09-13T00:52:16.893796632Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:52:16.893879 env[1189]: time="2025-09-13T00:52:16.893844344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.894254 env[1189]: time="2025-09-13T00:52:16.894197833Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:52:16.894254 env[1189]: time="2025-09-13T00:52:16.894227392Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.894254 env[1189]: time="2025-09-13T00:52:16.894246340Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Sep 13 00:52:16.894444 env[1189]: time="2025-09-13T00:52:16.894266120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.894444 env[1189]: time="2025-09-13T00:52:16.894424571Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.894827 env[1189]: time="2025-09-13T00:52:16.894792387Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 13 00:52:16.895023 env[1189]: time="2025-09-13T00:52:16.894993320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 13 00:52:16.895023 env[1189]: time="2025-09-13T00:52:16.895020335Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 13 00:52:16.895136 env[1189]: time="2025-09-13T00:52:16.895112393Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Sep 13 00:52:16.895186 env[1189]: time="2025-09-13T00:52:16.895134622Z" level=info msg="metadata content store policy set" policy=shared Sep 13 00:52:16.906191 env[1189]: time="2025-09-13T00:52:16.906125436Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906205987Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906220674Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906267299Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906282846Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906296068Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906366505Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906381 env[1189]: time="2025-09-13T00:52:16.906383264Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906559 env[1189]: time="2025-09-13T00:52:16.906396384Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906559 env[1189]: time="2025-09-13T00:52:16.906416341Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906559 env[1189]: time="2025-09-13T00:52:16.906439969Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.906559 env[1189]: time="2025-09-13T00:52:16.906453351Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 13 00:52:16.906703 env[1189]: time="2025-09-13T00:52:16.906614015Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.906751143Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907066842Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907105726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907121638Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907184252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907196544Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907208092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907218869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907281921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907295509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907321665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907336691Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907350221Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907589776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.907598 env[1189]: time="2025-09-13T00:52:16.907609656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907622209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907633447Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907667074Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907680728Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907697867Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Sep 13 00:52:16.908083 env[1189]: time="2025-09-13T00:52:16.907743083Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 13 00:52:16.908232 env[1189]: time="2025-09-13T00:52:16.907990277Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 13 00:52:16.910262 env[1189]: time="2025-09-13T00:52:16.908408883Z" level=info msg="Connect containerd service" Sep 13 00:52:16.910262 env[1189]: time="2025-09-13T00:52:16.908471573Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 13 00:52:16.910372 coreos-metadata[1166]: Sep 13 00:52:16.908 INFO Fetch successful Sep 13 00:52:16.913009 env[1189]: time="2025-09-13T00:52:16.912855432Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:52:16.913009 env[1189]: time="2025-09-13T00:52:16.912987004Z" level=info msg="Start subscribing containerd event" Sep 13 00:52:16.913163 env[1189]: time="2025-09-13T00:52:16.913029891Z" level=info msg="Start recovering state" Sep 13 00:52:16.913163 env[1189]: time="2025-09-13T00:52:16.913096162Z" level=info msg="Start event monitor" Sep 13 00:52:16.913163 env[1189]: time="2025-09-13T00:52:16.913111243Z" level=info msg="Start snapshots syncer" Sep 13 00:52:16.913163 env[1189]: time="2025-09-13T00:52:16.913120054Z" level=info msg="Start cni network conf syncer for default" Sep 13 00:52:16.913163 env[1189]: time="2025-09-13T00:52:16.913126745Z" level=info msg="Start streaming server" Sep 13 00:52:16.914665 env[1189]: time="2025-09-13T00:52:16.913533416Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 13 00:52:16.914665 env[1189]: time="2025-09-13T00:52:16.913609971Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 13 00:52:16.913831 systemd[1]: Started containerd.service. Sep 13 00:52:16.920354 unknown[1166]: wrote ssh authorized keys file for user: core Sep 13 00:52:16.926640 env[1189]: time="2025-09-13T00:52:16.921226917Z" level=info msg="containerd successfully booted in 0.106150s" Sep 13 00:52:16.947345 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Sep 13 00:52:16.980802 update-ssh-keys[1226]: Updated "/home/core/.ssh/authorized_keys" Sep 13 00:52:16.948027 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Sep 13 00:52:16.984971 extend-filesystems[1217]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Sep 13 00:52:16.984971 extend-filesystems[1217]: old_desc_blocks = 1, new_desc_blocks = 8 Sep 13 00:52:16.984971 extend-filesystems[1217]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Sep 13 00:52:16.989388 extend-filesystems[1171]: Resized filesystem in /dev/vda9 Sep 13 00:52:16.989388 extend-filesystems[1171]: Found vdb Sep 13 00:52:16.985884 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 13 00:52:16.986075 systemd[1]: Finished extend-filesystems.service. Sep 13 00:52:17.095150 locksmithd[1219]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 13 00:52:17.856539 systemd[1]: Started kubelet.service. Sep 13 00:52:18.414109 sshd_keygen[1195]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 13 00:52:18.434028 kubelet[1234]: E0913 00:52:18.433986 1234 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Sep 13 00:52:18.436009 systemd[1]: Finished sshd-keygen.service. Sep 13 00:52:18.438206 systemd[1]: Starting issuegen.service... Sep 13 00:52:18.438882 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Sep 13 00:52:18.439046 systemd[1]: kubelet.service: Failed with result 'exit-code'. Sep 13 00:52:18.439356 systemd[1]: kubelet.service: Consumed 1.204s CPU time. Sep 13 00:52:18.446364 systemd[1]: issuegen.service: Deactivated successfully. Sep 13 00:52:18.446521 systemd[1]: Finished issuegen.service. Sep 13 00:52:18.448469 systemd[1]: Starting systemd-user-sessions.service... Sep 13 00:52:18.455674 systemd[1]: Finished systemd-user-sessions.service. Sep 13 00:52:18.458311 systemd[1]: Started getty@tty1.service. Sep 13 00:52:18.460719 systemd[1]: Started serial-getty@ttyS0.service. Sep 13 00:52:18.461401 systemd[1]: Reached target getty.target. Sep 13 00:52:18.461788 systemd[1]: Reached target multi-user.target. Sep 13 00:52:18.463811 systemd[1]: Starting systemd-update-utmp-runlevel.service... Sep 13 00:52:18.472428 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 13 00:52:18.472612 systemd[1]: Finished systemd-update-utmp-runlevel.service. Sep 13 00:52:18.473135 systemd[1]: Startup finished in 966ms (kernel) + 4.818s (initrd) + 6.849s (userspace) = 12.634s. Sep 13 00:52:20.634237 systemd[1]: Created slice system-sshd.slice. Sep 13 00:52:20.635824 systemd[1]: Started sshd@0-146.190.141.251:22-147.75.109.163:38272.service. Sep 13 00:52:20.694031 sshd[1256]: Accepted publickey for core from 147.75.109.163 port 38272 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:20.697105 sshd[1256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:20.707327 systemd[1]: Created slice user-500.slice. Sep 13 00:52:20.708644 systemd[1]: Starting user-runtime-dir@500.service... Sep 13 00:52:20.712723 systemd-logind[1175]: New session 1 of user core. Sep 13 00:52:20.720703 systemd[1]: Finished user-runtime-dir@500.service. Sep 13 00:52:20.723534 systemd[1]: Starting user@500.service... Sep 13 00:52:20.728171 (systemd)[1259]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:20.813687 systemd[1259]: Queued start job for default target default.target. Sep 13 00:52:20.814660 systemd[1259]: Reached target paths.target. Sep 13 00:52:20.814837 systemd[1259]: Reached target sockets.target. Sep 13 00:52:20.814919 systemd[1259]: Reached target timers.target. Sep 13 00:52:20.815097 systemd[1259]: Reached target basic.target. Sep 13 00:52:20.815215 systemd[1259]: Reached target default.target. Sep 13 00:52:20.815327 systemd[1]: Started user@500.service. Sep 13 00:52:20.815561 systemd[1259]: Startup finished in 79ms. Sep 13 00:52:20.816849 systemd[1]: Started session-1.scope. Sep 13 00:52:20.883432 systemd[1]: Started sshd@1-146.190.141.251:22-147.75.109.163:38288.service. Sep 13 00:52:20.940842 sshd[1268]: Accepted publickey for core from 147.75.109.163 port 38288 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:20.942528 sshd[1268]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:20.948370 systemd-logind[1175]: New session 2 of user core. Sep 13 00:52:20.948945 systemd[1]: Started session-2.scope. Sep 13 00:52:21.012467 sshd[1268]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:21.017493 systemd[1]: sshd@1-146.190.141.251:22-147.75.109.163:38288.service: Deactivated successfully. Sep 13 00:52:21.018533 systemd[1]: session-2.scope: Deactivated successfully. Sep 13 00:52:21.019271 systemd-logind[1175]: Session 2 logged out. Waiting for processes to exit. Sep 13 00:52:21.021069 systemd[1]: Started sshd@2-146.190.141.251:22-147.75.109.163:38298.service. Sep 13 00:52:21.023685 systemd-logind[1175]: Removed session 2. Sep 13 00:52:21.074572 sshd[1274]: Accepted publickey for core from 147.75.109.163 port 38298 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:21.076684 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:21.081530 systemd-logind[1175]: New session 3 of user core. Sep 13 00:52:21.082268 systemd[1]: Started session-3.scope. Sep 13 00:52:21.140177 sshd[1274]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:21.144853 systemd[1]: sshd@2-146.190.141.251:22-147.75.109.163:38298.service: Deactivated successfully. Sep 13 00:52:21.145643 systemd[1]: session-3.scope: Deactivated successfully. Sep 13 00:52:21.146219 systemd-logind[1175]: Session 3 logged out. Waiting for processes to exit. Sep 13 00:52:21.147857 systemd[1]: Started sshd@3-146.190.141.251:22-147.75.109.163:38304.service. Sep 13 00:52:21.151659 systemd-logind[1175]: Removed session 3. Sep 13 00:52:21.199578 sshd[1280]: Accepted publickey for core from 147.75.109.163 port 38304 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:21.201661 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:21.207375 systemd[1]: Started session-4.scope. Sep 13 00:52:21.207882 systemd-logind[1175]: New session 4 of user core. Sep 13 00:52:21.269642 sshd[1280]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:21.274450 systemd[1]: sshd@3-146.190.141.251:22-147.75.109.163:38304.service: Deactivated successfully. Sep 13 00:52:21.275114 systemd[1]: session-4.scope: Deactivated successfully. Sep 13 00:52:21.275876 systemd-logind[1175]: Session 4 logged out. Waiting for processes to exit. Sep 13 00:52:21.277084 systemd[1]: Started sshd@4-146.190.141.251:22-147.75.109.163:38316.service. Sep 13 00:52:21.278563 systemd-logind[1175]: Removed session 4. Sep 13 00:52:21.329653 sshd[1286]: Accepted publickey for core from 147.75.109.163 port 38316 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:21.331769 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:21.337389 systemd[1]: Started session-5.scope. Sep 13 00:52:21.337852 systemd-logind[1175]: New session 5 of user core. Sep 13 00:52:21.406068 sudo[1289]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 13 00:52:21.406363 sudo[1289]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:52:21.414539 dbus-daemon[1167]: \xd0ݥ\xe9\xbcU: received setenforce notice (enforcing=-728967088) Sep 13 00:52:21.417085 sudo[1289]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:21.421849 sshd[1286]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:21.427173 systemd[1]: sshd@4-146.190.141.251:22-147.75.109.163:38316.service: Deactivated successfully. Sep 13 00:52:21.428005 systemd[1]: session-5.scope: Deactivated successfully. Sep 13 00:52:21.428760 systemd-logind[1175]: Session 5 logged out. Waiting for processes to exit. Sep 13 00:52:21.430525 systemd[1]: Started sshd@5-146.190.141.251:22-147.75.109.163:38330.service. Sep 13 00:52:21.432443 systemd-logind[1175]: Removed session 5. Sep 13 00:52:21.484688 sshd[1293]: Accepted publickey for core from 147.75.109.163 port 38330 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:21.486784 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:21.492846 systemd[1]: Started session-6.scope. Sep 13 00:52:21.493380 systemd-logind[1175]: New session 6 of user core. Sep 13 00:52:21.555711 sudo[1297]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 13 00:52:21.556450 sudo[1297]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:52:21.559941 sudo[1297]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:21.566119 sudo[1296]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 13 00:52:21.566388 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:52:21.577127 systemd[1]: Stopping audit-rules.service... Sep 13 00:52:21.586346 kernel: kauditd_printk_skb: 33 callbacks suppressed Sep 13 00:52:21.586440 kernel: audit: type=1305 audit(1757724741.578:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:52:21.586476 kernel: audit: type=1300 audit(1757724741.578:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd09e0a780 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.586496 kernel: audit: type=1327 audit(1757724741.578:208): proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:52:21.586513 kernel: audit: type=1131 audit(1757724741.584:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.578000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Sep 13 00:52:21.578000 audit[1300]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd09e0a780 a2=420 a3=0 items=0 ppid=1 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.578000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Sep 13 00:52:21.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.586789 auditctl[1300]: No rules Sep 13 00:52:21.584811 systemd[1]: audit-rules.service: Deactivated successfully. Sep 13 00:52:21.585011 systemd[1]: Stopped audit-rules.service. Sep 13 00:52:21.588198 systemd[1]: Starting audit-rules.service... Sep 13 00:52:21.609822 augenrules[1317]: No rules Sep 13 00:52:21.610830 systemd[1]: Finished audit-rules.service. Sep 13 00:52:21.617352 kernel: audit: type=1130 audit(1757724741.609:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.617468 kernel: audit: type=1106 audit(1757724741.610:211): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.617492 kernel: audit: type=1104 audit(1757724741.610:212): pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.610000 audit[1296]: USER_END pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.610000 audit[1296]: CRED_DISP pid=1296 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.612143 sudo[1296]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:21.620533 sshd[1293]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:21.621000 audit[1293]: USER_END pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.624706 systemd[1]: sshd@5-146.190.141.251:22-147.75.109.163:38330.service: Deactivated successfully. Sep 13 00:52:21.625462 systemd[1]: session-6.scope: Deactivated successfully. Sep 13 00:52:21.621000 audit[1293]: CRED_DISP pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.634042 kernel: audit: type=1106 audit(1757724741.621:213): pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.634173 kernel: audit: type=1104 audit(1757724741.621:214): pid=1293 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.634209 kernel: audit: type=1131 audit(1757724741.623:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.141.251:22-147.75.109.163:38330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-146.190.141.251:22-147.75.109.163:38330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.141.251:22-147.75.109.163:38340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.630650 systemd-logind[1175]: Session 6 logged out. Waiting for processes to exit. Sep 13 00:52:21.634173 systemd[1]: Started sshd@6-146.190.141.251:22-147.75.109.163:38340.service. Sep 13 00:52:21.635936 systemd-logind[1175]: Removed session 6. Sep 13 00:52:21.680000 audit[1323]: USER_ACCT pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.681067 sshd[1323]: Accepted publickey for core from 147.75.109.163 port 38340 ssh2: RSA SHA256:Z+gHFjZa6FbNcZ3OMDgtPyMdExX9gV+gkyGg/y2DokA Sep 13 00:52:21.682000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.682000 audit[1323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff012f10d0 a2=3 a3=0 items=0 ppid=1 pid=1323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:21.682000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Sep 13 00:52:21.683137 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Sep 13 00:52:21.688266 systemd[1]: Started session-7.scope. Sep 13 00:52:21.689625 systemd-logind[1175]: New session 7 of user core. Sep 13 00:52:21.694000 audit[1323]: USER_START pid=1323 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.696000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:21.747000 audit[1326]: USER_ACCT pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.748936 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Sep 13 00:52:21.749201 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Sep 13 00:52:21.747000 audit[1326]: CRED_REFR pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.750000 audit[1326]: USER_START pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:21.767759 systemd[1]: Starting coreos-metadata.service... Sep 13 00:52:21.826735 coreos-metadata[1330]: Sep 13 00:52:21.826 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Sep 13 00:52:21.839562 coreos-metadata[1330]: Sep 13 00:52:21.839 INFO Fetch successful Sep 13 00:52:21.853293 systemd[1]: Finished coreos-metadata.service. Sep 13 00:52:21.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:22.500668 systemd[1]: Stopped kubelet.service. Sep 13 00:52:22.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:22.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:22.501606 systemd[1]: kubelet.service: Consumed 1.204s CPU time. Sep 13 00:52:22.504217 systemd[1]: Starting kubelet.service... Sep 13 00:52:22.548544 systemd[1]: Reloading. Sep 13 00:52:22.666256 /usr/lib/systemd/system-generators/torcx-generator[1382]: time="2025-09-13T00:52:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Sep 13 00:52:22.666657 /usr/lib/systemd/system-generators/torcx-generator[1382]: time="2025-09-13T00:52:22Z" level=info msg="torcx already run" Sep 13 00:52:22.749724 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Sep 13 00:52:22.750066 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Sep 13 00:52:22.769309 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit: BPF prog-id=40 op=LOAD Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.850000 audit: BPF prog-id=41 op=LOAD Sep 13 00:52:22.850000 audit: BPF prog-id=24 op=UNLOAD Sep 13 00:52:22.850000 audit: BPF prog-id=25 op=UNLOAD Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit: BPF prog-id=42 op=LOAD Sep 13 00:52:22.853000 audit: BPF prog-id=26 op=UNLOAD Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit: BPF prog-id=43 op=LOAD Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.854000 audit: BPF prog-id=44 op=LOAD Sep 13 00:52:22.854000 audit: BPF prog-id=27 op=UNLOAD Sep 13 00:52:22.854000 audit: BPF prog-id=28 op=UNLOAD Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit: BPF prog-id=45 op=LOAD Sep 13 00:52:22.856000 audit: BPF prog-id=35 op=UNLOAD Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit: BPF prog-id=46 op=LOAD Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.857000 audit: BPF prog-id=47 op=LOAD Sep 13 00:52:22.857000 audit: BPF prog-id=36 op=UNLOAD Sep 13 00:52:22.857000 audit: BPF prog-id=37 op=UNLOAD Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.859000 audit: BPF prog-id=48 op=LOAD Sep 13 00:52:22.859000 audit: BPF prog-id=33 op=UNLOAD Sep 13 00:52:22.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.860000 audit: BPF prog-id=49 op=LOAD Sep 13 00:52:22.860000 audit: BPF prog-id=34 op=UNLOAD Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit: BPF prog-id=50 op=LOAD Sep 13 00:52:22.862000 audit: BPF prog-id=29 op=UNLOAD Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit: BPF prog-id=51 op=LOAD Sep 13 00:52:22.863000 audit: BPF prog-id=30 op=UNLOAD Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.863000 audit: BPF prog-id=52 op=LOAD Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.864000 audit: BPF prog-id=53 op=LOAD Sep 13 00:52:22.864000 audit: BPF prog-id=31 op=UNLOAD Sep 13 00:52:22.864000 audit: BPF prog-id=32 op=UNLOAD Sep 13 00:52:22.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:22.867000 audit: BPF prog-id=54 op=LOAD Sep 13 00:52:22.867000 audit: BPF prog-id=38 op=UNLOAD Sep 13 00:52:22.896108 systemd[1]: Started kubelet.service. Sep 13 00:52:22.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:22.899189 systemd[1]: Stopping kubelet.service... Sep 13 00:52:22.899783 systemd[1]: kubelet.service: Deactivated successfully. Sep 13 00:52:22.900076 systemd[1]: Stopped kubelet.service. Sep 13 00:52:22.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:22.902270 systemd[1]: Starting kubelet.service... Sep 13 00:52:23.018008 systemd[1]: Started kubelet.service. Sep 13 00:52:23.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:23.084353 kubelet[1437]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:23.084353 kubelet[1437]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Sep 13 00:52:23.084353 kubelet[1437]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Sep 13 00:52:23.084353 kubelet[1437]: I0913 00:52:23.081026 1437 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Sep 13 00:52:23.392332 kubelet[1437]: I0913 00:52:23.392156 1437 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Sep 13 00:52:23.392522 kubelet[1437]: I0913 00:52:23.392500 1437 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Sep 13 00:52:23.392896 kubelet[1437]: I0913 00:52:23.392877 1437 server.go:954] "Client rotation is on, will bootstrap in background" Sep 13 00:52:23.423390 kubelet[1437]: I0913 00:52:23.423349 1437 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Sep 13 00:52:23.433240 kubelet[1437]: E0913 00:52:23.433182 1437 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Sep 13 00:52:23.433240 kubelet[1437]: I0913 00:52:23.433219 1437 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Sep 13 00:52:23.439496 kubelet[1437]: I0913 00:52:23.439417 1437 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Sep 13 00:52:23.441418 kubelet[1437]: I0913 00:52:23.441368 1437 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Sep 13 00:52:23.441725 kubelet[1437]: I0913 00:52:23.441415 1437 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"146.190.141.251","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Sep 13 00:52:23.441959 kubelet[1437]: I0913 00:52:23.441730 1437 topology_manager.go:138] "Creating topology manager with none policy" Sep 13 00:52:23.441959 kubelet[1437]: I0913 00:52:23.441746 1437 container_manager_linux.go:304] "Creating device plugin manager" Sep 13 00:52:23.441959 kubelet[1437]: I0913 00:52:23.441883 1437 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:23.445684 kubelet[1437]: I0913 00:52:23.445646 1437 kubelet.go:446] "Attempting to sync node with API server" Sep 13 00:52:23.447620 kubelet[1437]: I0913 00:52:23.447587 1437 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Sep 13 00:52:23.450073 kubelet[1437]: I0913 00:52:23.450045 1437 kubelet.go:352] "Adding apiserver pod source" Sep 13 00:52:23.450073 kubelet[1437]: I0913 00:52:23.450070 1437 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Sep 13 00:52:23.453110 kubelet[1437]: E0913 00:52:23.453081 1437 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:23.453262 kubelet[1437]: E0913 00:52:23.453248 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:23.454750 kubelet[1437]: I0913 00:52:23.454729 1437 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Sep 13 00:52:23.455325 kubelet[1437]: I0913 00:52:23.455292 1437 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Sep 13 00:52:23.456093 kubelet[1437]: W0913 00:52:23.456075 1437 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Sep 13 00:52:23.458833 kubelet[1437]: I0913 00:52:23.458812 1437 watchdog_linux.go:99] "Systemd watchdog is not enabled" Sep 13 00:52:23.458972 kubelet[1437]: I0913 00:52:23.458960 1437 server.go:1287] "Started kubelet" Sep 13 00:52:23.460758 kubelet[1437]: I0913 00:52:23.460717 1437 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Sep 13 00:52:23.460881 kubelet[1437]: I0913 00:52:23.460861 1437 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Sep 13 00:52:23.461059 kubelet[1437]: I0913 00:52:23.461044 1437 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Sep 13 00:52:23.460000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:23.460000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:23.460000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000afdb60 a1=c00094a918 a2=c000afdb30 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:23.460000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:23.460000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:23.460000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00096ec40 a1=c00094a930 a2=c000afdbf0 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.460000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:23.464214 kubelet[1437]: W0913 00:52:23.464190 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Sep 13 00:52:23.464319 kubelet[1437]: E0913 00:52:23.464293 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:anonymous\" cannot list resource \"services\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:52:23.464425 kubelet[1437]: W0913 00:52:23.464410 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "146.190.141.251" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Sep 13 00:52:23.464478 kubelet[1437]: E0913 00:52:23.464429 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes \"146.190.141.251\" is forbidden: User \"system:anonymous\" cannot list resource \"nodes\" in API group \"\" at the cluster scope" logger="UnhandledError" Sep 13 00:52:23.467618 kubelet[1437]: I0913 00:52:23.467208 1437 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Sep 13 00:52:23.468311 kubelet[1437]: I0913 00:52:23.468214 1437 server.go:479] "Adding debug handlers to kubelet server" Sep 13 00:52:23.469387 kubelet[1437]: I0913 00:52:23.469339 1437 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Sep 13 00:52:23.469581 kubelet[1437]: I0913 00:52:23.469566 1437 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Sep 13 00:52:23.469778 kubelet[1437]: I0913 00:52:23.469762 1437 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Sep 13 00:52:23.472054 kubelet[1437]: E0913 00:52:23.471832 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:23.472054 kubelet[1437]: I0913 00:52:23.471927 1437 volume_manager.go:297] "Starting Kubelet Volume Manager" Sep 13 00:52:23.472211 kubelet[1437]: I0913 00:52:23.472145 1437 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Sep 13 00:52:23.472257 kubelet[1437]: I0913 00:52:23.472241 1437 reconciler.go:26] "Reconciler: start to sync state" Sep 13 00:52:23.473439 kubelet[1437]: I0913 00:52:23.473411 1437 factory.go:221] Registration of the systemd container factory successfully Sep 13 00:52:23.473529 kubelet[1437]: I0913 00:52:23.473511 1437 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Sep 13 00:52:23.476358 kubelet[1437]: W0913 00:52:23.474953 1437 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Sep 13 00:52:23.476358 kubelet[1437]: E0913 00:52:23.474993 1437 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:anonymous\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope" logger="UnhandledError" Sep 13 00:52:23.478337 kubelet[1437]: E0913 00:52:23.477133 1437 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Sep 13 00:52:23.478337 kubelet[1437]: E0913 00:52:23.473893 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.141.251.1864b15762c8be8b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.141.251,UID:146.190.141.251,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:146.190.141.251,},FirstTimestamp:2025-09-13 00:52:23.458930315 +0000 UTC m=+0.433509508,LastTimestamp:2025-09-13 00:52:23.458930315 +0000 UTC m=+0.433509508,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.141.251,}" Sep 13 00:52:23.479625 kubelet[1437]: I0913 00:52:23.479593 1437 factory.go:221] Registration of the containerd container factory successfully Sep 13 00:52:23.491333 kubelet[1437]: E0913 00:52:23.491272 1437 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"146.190.141.251\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Sep 13 00:52:23.491693 kubelet[1437]: E0913 00:52:23.491602 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.141.251.1864b15763de59b0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.141.251,UID:146.190.141.251,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:146.190.141.251,},FirstTimestamp:2025-09-13 00:52:23.477123504 +0000 UTC m=+0.451702703,LastTimestamp:2025-09-13 00:52:23.477123504 +0000 UTC m=+0.451702703,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.141.251,}" Sep 13 00:52:23.495840 kubelet[1437]: E0913 00:52:23.495758 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.141.251.1864b15764e9f18c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.141.251,UID:146.190.141.251,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientMemory,Message:Node 146.190.141.251 status is now: NodeHasSufficientMemory,Source:EventSource{Component:kubelet,Host:146.190.141.251,},FirstTimestamp:2025-09-13 00:52:23.494660492 +0000 UTC m=+0.469239670,LastTimestamp:2025-09-13 00:52:23.494660492 +0000 UTC m=+0.469239670,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.141.251,}" Sep 13 00:52:23.496033 kubelet[1437]: I0913 00:52:23.495991 1437 cpu_manager.go:221] "Starting CPU manager" policy="none" Sep 13 00:52:23.496033 kubelet[1437]: I0913 00:52:23.496007 1437 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Sep 13 00:52:23.496033 kubelet[1437]: I0913 00:52:23.496027 1437 state_mem.go:36] "Initialized new in-memory state store" Sep 13 00:52:23.497083 kubelet[1437]: I0913 00:52:23.497060 1437 policy_none.go:49] "None policy: Start" Sep 13 00:52:23.497083 kubelet[1437]: I0913 00:52:23.497089 1437 memory_manager.go:186] "Starting memorymanager" policy="None" Sep 13 00:52:23.497228 kubelet[1437]: I0913 00:52:23.497108 1437 state_mem.go:35] "Initializing new in-memory state store" Sep 13 00:52:23.502699 kubelet[1437]: E0913 00:52:23.502569 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.141.251.1864b15764ea03e2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.141.251,UID:146.190.141.251,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasNoDiskPressure,Message:Node 146.190.141.251 status is now: NodeHasNoDiskPressure,Source:EventSource{Component:kubelet,Host:146.190.141.251,},FirstTimestamp:2025-09-13 00:52:23.494665186 +0000 UTC m=+0.469244376,LastTimestamp:2025-09-13 00:52:23.494665186 +0000 UTC m=+0.469244376,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.141.251,}" Sep 13 00:52:23.503941 systemd[1]: Created slice kubepods.slice. Sep 13 00:52:23.514954 kubelet[1437]: E0913 00:52:23.513161 1437 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{146.190.141.251.1864b15764ea0d48 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:146.190.141.251,UID:146.190.141.251,APIVersion:,ResourceVersion:,FieldPath:,},Reason:NodeHasSufficientPID,Message:Node 146.190.141.251 status is now: NodeHasSufficientPID,Source:EventSource{Component:kubelet,Host:146.190.141.251,},FirstTimestamp:2025-09-13 00:52:23.494667592 +0000 UTC m=+0.469246782,LastTimestamp:2025-09-13 00:52:23.494667592 +0000 UTC m=+0.469246782,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:146.190.141.251,}" Sep 13 00:52:23.515844 systemd[1]: Created slice kubepods-besteffort.slice. Sep 13 00:52:23.522484 systemd[1]: Created slice kubepods-burstable.slice. Sep 13 00:52:23.522000 audit[1437]: AVC avc: denied { mac_admin } for pid=1437 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:23.522000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Sep 13 00:52:23.522000 audit[1437]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c05830 a1=c000ea8d38 a2=c000c05800 a3=25 items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Sep 13 00:52:23.523815 kubelet[1437]: I0913 00:52:23.523441 1437 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Sep 13 00:52:23.523815 kubelet[1437]: I0913 00:52:23.523502 1437 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Sep 13 00:52:23.523815 kubelet[1437]: I0913 00:52:23.523609 1437 eviction_manager.go:189] "Eviction manager: starting control loop" Sep 13 00:52:23.523815 kubelet[1437]: I0913 00:52:23.523622 1437 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Sep 13 00:52:23.525041 kubelet[1437]: I0913 00:52:23.524590 1437 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Sep 13 00:52:23.528669 kubelet[1437]: E0913 00:52:23.525831 1437 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Sep 13 00:52:23.528669 kubelet[1437]: E0913 00:52:23.525877 1437 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"146.190.141.251\" not found" Sep 13 00:52:23.543000 audit[1454]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.543000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1d47e060 a2=0 a3=7ffd1d47e04c items=0 ppid=1437 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:23.547000 audit[1457]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.547000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd503de990 a2=0 a3=7ffd503de97c items=0 ppid=1437 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:23.550000 audit[1459]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.550000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffbff7f0d0 a2=0 a3=7fffbff7f0bc items=0 ppid=1437 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:23.569000 audit[1464]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.569000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc10c18ce0 a2=0 a3=7ffc10c18ccc items=0 ppid=1437 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:23.625784 kubelet[1437]: I0913 00:52:23.625746 1437 kubelet_node_status.go:75] "Attempting to register node" node="146.190.141.251" Sep 13 00:52:23.628000 audit[1469]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.628000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffea7fcba0 a2=0 a3=7fffea7fcb8c items=0 ppid=1437 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Sep 13 00:52:23.630449 kubelet[1437]: I0913 00:52:23.630415 1437 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Sep 13 00:52:23.630000 audit[1470]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:23.630000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd05e041c0 a2=0 a3=7ffd05e041ac items=0 ppid=1437 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.630000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Sep 13 00:52:23.632221 kubelet[1437]: I0913 00:52:23.632199 1437 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Sep 13 00:52:23.632333 kubelet[1437]: I0913 00:52:23.632322 1437 status_manager.go:227] "Starting to sync pod status with apiserver" Sep 13 00:52:23.632413 kubelet[1437]: I0913 00:52:23.632400 1437 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Sep 13 00:52:23.632479 kubelet[1437]: I0913 00:52:23.632470 1437 kubelet.go:2382] "Starting kubelet main sync loop" Sep 13 00:52:23.632663 kubelet[1437]: E0913 00:52:23.632648 1437 kubelet.go:2406] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Sep 13 00:52:23.632000 audit[1471]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.632000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeff953f0 a2=0 a3=7ffeeff953dc items=0 ppid=1437 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:23.633000 audit[1472]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:23.633000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca5f45df0 a2=0 a3=7ffca5f45ddc items=0 ppid=1437 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Sep 13 00:52:23.633000 audit[1473]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.633000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc6493b030 a2=0 a3=7ffc6493b01c items=0 ppid=1437 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:23.634000 audit[1474]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:23.634000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff8aa381f0 a2=0 a3=7fff8aa381dc items=0 ppid=1437 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.634000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Sep 13 00:52:23.637161 kubelet[1437]: I0913 00:52:23.637137 1437 kubelet_node_status.go:78] "Successfully registered node" node="146.190.141.251" Sep 13 00:52:23.637243 kubelet[1437]: E0913 00:52:23.637166 1437 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"146.190.141.251\": node \"146.190.141.251\" not found" Sep 13 00:52:23.636000 audit[1475]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:23.636000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf52a15d0 a2=0 a3=7ffdf52a15bc items=0 ppid=1437 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:23.636000 audit[1476]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:23.636000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc3080820 a2=0 a3=7ffcc308080c items=0 ppid=1437 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:23.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Sep 13 00:52:23.650726 kubelet[1437]: E0913 00:52:23.647743 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:23.751109 kubelet[1437]: E0913 00:52:23.751053 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:23.851799 kubelet[1437]: E0913 00:52:23.851738 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:23.953532 kubelet[1437]: E0913 00:52:23.953132 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.054326 kubelet[1437]: E0913 00:52:24.054253 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.061946 sudo[1326]: pam_unix(sudo:session): session closed for user root Sep 13 00:52:24.061000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.061000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.065566 sshd[1323]: pam_unix(sshd:session): session closed for user core Sep 13 00:52:24.066000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:24.066000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Sep 13 00:52:24.068907 systemd[1]: sshd@6-146.190.141.251:22-147.75.109.163:38340.service: Deactivated successfully. Sep 13 00:52:24.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-146.190.141.251:22-147.75.109.163:38340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Sep 13 00:52:24.069937 systemd[1]: session-7.scope: Deactivated successfully. Sep 13 00:52:24.070704 systemd-logind[1175]: Session 7 logged out. Waiting for processes to exit. Sep 13 00:52:24.071863 systemd-logind[1175]: Removed session 7. Sep 13 00:52:24.154998 kubelet[1437]: E0913 00:52:24.154927 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.255857 kubelet[1437]: E0913 00:52:24.255711 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.356630 kubelet[1437]: E0913 00:52:24.356566 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.395394 kubelet[1437]: I0913 00:52:24.395339 1437 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Sep 13 00:52:24.395800 kubelet[1437]: W0913 00:52:24.395781 1437 reflector.go:492] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Sep 13 00:52:24.453905 kubelet[1437]: E0913 00:52:24.453832 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:24.457599 kubelet[1437]: E0913 00:52:24.457542 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.557824 kubelet[1437]: E0913 00:52:24.557693 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.658990 kubelet[1437]: E0913 00:52:24.658916 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.759747 kubelet[1437]: E0913 00:52:24.759675 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.860673 kubelet[1437]: E0913 00:52:24.860529 1437 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"146.190.141.251\" not found" Sep 13 00:52:24.961994 kubelet[1437]: I0913 00:52:24.961958 1437 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Sep 13 00:52:24.962571 env[1189]: time="2025-09-13T00:52:24.962502425Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Sep 13 00:52:24.962920 kubelet[1437]: I0913 00:52:24.962755 1437 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Sep 13 00:52:25.453950 kubelet[1437]: I0913 00:52:25.453888 1437 apiserver.go:52] "Watching apiserver" Sep 13 00:52:25.454627 kubelet[1437]: E0913 00:52:25.454596 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:25.458778 kubelet[1437]: E0913 00:52:25.458738 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:25.463936 systemd[1]: Created slice kubepods-besteffort-pod2821966d_6958_4f04_9d36_d4617b719919.slice. Sep 13 00:52:25.474124 kubelet[1437]: I0913 00:52:25.474082 1437 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Sep 13 00:52:25.475727 systemd[1]: Created slice kubepods-besteffort-pod72b9bbb2_3418_4831_a3bd_3699a8ed214c.slice. Sep 13 00:52:25.485060 kubelet[1437]: I0913 00:52:25.484995 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-var-run-calico\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485060 kubelet[1437]: I0913 00:52:25.485041 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/51a013dc-6244-4047-ae4c-28cabcf3140a-kubelet-dir\") pod \"csi-node-driver-kx9d4\" (UID: \"51a013dc-6244-4047-ae4c-28cabcf3140a\") " pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:25.485060 kubelet[1437]: I0913 00:52:25.485057 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/51a013dc-6244-4047-ae4c-28cabcf3140a-registration-dir\") pod \"csi-node-driver-kx9d4\" (UID: \"51a013dc-6244-4047-ae4c-28cabcf3140a\") " pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:25.485271 kubelet[1437]: I0913 00:52:25.485077 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5w4qb\" (UniqueName: \"kubernetes.io/projected/51a013dc-6244-4047-ae4c-28cabcf3140a-kube-api-access-5w4qb\") pod \"csi-node-driver-kx9d4\" (UID: \"51a013dc-6244-4047-ae4c-28cabcf3140a\") " pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:25.485271 kubelet[1437]: I0913 00:52:25.485093 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2821966d-6958-4f04-9d36-d4617b719919-kube-proxy\") pod \"kube-proxy-wsnq9\" (UID: \"2821966d-6958-4f04-9d36-d4617b719919\") " pod="kube-system/kube-proxy-wsnq9" Sep 13 00:52:25.485271 kubelet[1437]: I0913 00:52:25.485110 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2821966d-6958-4f04-9d36-d4617b719919-lib-modules\") pod \"kube-proxy-wsnq9\" (UID: \"2821966d-6958-4f04-9d36-d4617b719919\") " pod="kube-system/kube-proxy-wsnq9" Sep 13 00:52:25.485271 kubelet[1437]: I0913 00:52:25.485125 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-cni-bin-dir\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485271 kubelet[1437]: I0913 00:52:25.485154 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-lib-modules\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485443 kubelet[1437]: I0913 00:52:25.485175 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-policysync\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485443 kubelet[1437]: I0913 00:52:25.485191 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/72b9bbb2-3418-4831-a3bd-3699a8ed214c-tigera-ca-bundle\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485443 kubelet[1437]: I0913 00:52:25.485206 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-var-lib-calico\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485443 kubelet[1437]: I0913 00:52:25.485222 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/51a013dc-6244-4047-ae4c-28cabcf3140a-socket-dir\") pod \"csi-node-driver-kx9d4\" (UID: \"51a013dc-6244-4047-ae4c-28cabcf3140a\") " pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:25.485443 kubelet[1437]: I0913 00:52:25.485237 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-cni-log-dir\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485613 kubelet[1437]: I0913 00:52:25.485252 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-flexvol-driver-host\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485613 kubelet[1437]: I0913 00:52:25.485268 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/72b9bbb2-3418-4831-a3bd-3699a8ed214c-node-certs\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485613 kubelet[1437]: I0913 00:52:25.485285 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bphdk\" (UniqueName: \"kubernetes.io/projected/72b9bbb2-3418-4831-a3bd-3699a8ed214c-kube-api-access-bphdk\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485613 kubelet[1437]: I0913 00:52:25.485330 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/51a013dc-6244-4047-ae4c-28cabcf3140a-varrun\") pod \"csi-node-driver-kx9d4\" (UID: \"51a013dc-6244-4047-ae4c-28cabcf3140a\") " pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:25.485613 kubelet[1437]: I0913 00:52:25.485348 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2821966d-6958-4f04-9d36-d4617b719919-xtables-lock\") pod \"kube-proxy-wsnq9\" (UID: \"2821966d-6958-4f04-9d36-d4617b719919\") " pod="kube-system/kube-proxy-wsnq9" Sep 13 00:52:25.485862 kubelet[1437]: I0913 00:52:25.485367 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-cni-net-dir\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.485862 kubelet[1437]: I0913 00:52:25.485383 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fb62n\" (UniqueName: \"kubernetes.io/projected/2821966d-6958-4f04-9d36-d4617b719919-kube-api-access-fb62n\") pod \"kube-proxy-wsnq9\" (UID: \"2821966d-6958-4f04-9d36-d4617b719919\") " pod="kube-system/kube-proxy-wsnq9" Sep 13 00:52:25.485862 kubelet[1437]: I0913 00:52:25.485398 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/72b9bbb2-3418-4831-a3bd-3699a8ed214c-xtables-lock\") pod \"calico-node-4f2tj\" (UID: \"72b9bbb2-3418-4831-a3bd-3699a8ed214c\") " pod="calico-system/calico-node-4f2tj" Sep 13 00:52:25.586860 kubelet[1437]: I0913 00:52:25.586820 1437 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Sep 13 00:52:25.595442 kubelet[1437]: E0913 00:52:25.595409 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:25.595617 kubelet[1437]: W0913 00:52:25.595599 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:25.595703 kubelet[1437]: E0913 00:52:25.595689 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:25.614639 kubelet[1437]: E0913 00:52:25.614486 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:25.614639 kubelet[1437]: W0913 00:52:25.614508 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:25.614639 kubelet[1437]: E0913 00:52:25.614530 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:25.623442 kubelet[1437]: E0913 00:52:25.618252 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:25.623442 kubelet[1437]: W0913 00:52:25.618273 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:25.623442 kubelet[1437]: E0913 00:52:25.618293 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:25.624921 kubelet[1437]: E0913 00:52:25.624521 1437 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Sep 13 00:52:25.624921 kubelet[1437]: W0913 00:52:25.624548 1437 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Sep 13 00:52:25.624921 kubelet[1437]: E0913 00:52:25.624570 1437 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Sep 13 00:52:25.774539 kubelet[1437]: E0913 00:52:25.773438 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Sep 13 00:52:25.774969 env[1189]: time="2025-09-13T00:52:25.774931303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wsnq9,Uid:2821966d-6958-4f04-9d36-d4617b719919,Namespace:kube-system,Attempt:0,}" Sep 13 00:52:25.781829 env[1189]: time="2025-09-13T00:52:25.781785999Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4f2tj,Uid:72b9bbb2-3418-4831-a3bd-3699a8ed214c,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:26.319128 env[1189]: time="2025-09-13T00:52:26.319075100Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.320420 env[1189]: time="2025-09-13T00:52:26.320380375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.321475 env[1189]: time="2025-09-13T00:52:26.321441702Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.324216 env[1189]: time="2025-09-13T00:52:26.324176955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.326458 env[1189]: time="2025-09-13T00:52:26.326421763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.328730 env[1189]: time="2025-09-13T00:52:26.328671488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.330456 env[1189]: time="2025-09-13T00:52:26.330414682Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.333265 env[1189]: time="2025-09-13T00:52:26.333227479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.349399223Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.349474762Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.349488817Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.349707073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3 pid=1501 runtime=io.containerd.runc.v2 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.347366148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.347408717Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.347418929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:26.356462 env[1189]: time="2025-09-13T00:52:26.347551748Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c17a252e918d498ea34b03ccd9d684a7dd308609ae1be01220b535d8ccbbdd34 pid=1500 runtime=io.containerd.runc.v2 Sep 13 00:52:26.374866 systemd[1]: Started cri-containerd-88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3.scope. Sep 13 00:52:26.385819 systemd[1]: Started cri-containerd-c17a252e918d498ea34b03ccd9d684a7dd308609ae1be01220b535d8ccbbdd34.scope. Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.402000 audit: BPF prog-id=55 op=LOAD Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1501 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613339326136393833323833616336376465393737656335303030 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1501 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613339326136393833323833616336376465393737656335303030 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.403000 audit: BPF prog-id=56 op=LOAD Sep 13 00:52:26.403000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c1050 items=0 ppid=1501 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613339326136393833323833616336376465393737656335303030 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.404000 audit: BPF prog-id=57 op=LOAD Sep 13 00:52:26.404000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c1098 items=0 ppid=1501 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613339326136393833323833616336376465393737656335303030 Sep 13 00:52:26.405000 audit: BPF prog-id=57 op=UNLOAD Sep 13 00:52:26.405000 audit: BPF prog-id=56 op=UNLOAD Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.405000 audit: BPF prog-id=58 op=LOAD Sep 13 00:52:26.405000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c14a8 items=0 ppid=1501 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838613339326136393833323833616336376465393737656335303030 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.422000 audit: BPF prog-id=59 op=LOAD Sep 13 00:52:26.423000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.423000 audit[1522]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1500 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376132353265393138643439386561333462303363636439643638 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1500 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376132353265393138643439386561333462303363636439643638 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.424000 audit: BPF prog-id=60 op=LOAD Sep 13 00:52:26.424000 audit[1522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025c10 items=0 ppid=1500 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376132353265393138643439386561333462303363636439643638 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit: BPF prog-id=61 op=LOAD Sep 13 00:52:26.425000 audit[1522]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025c58 items=0 ppid=1500 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376132353265393138643439386561333462303363636439643638 Sep 13 00:52:26.425000 audit: BPF prog-id=61 op=UNLOAD Sep 13 00:52:26.425000 audit: BPF prog-id=60 op=UNLOAD Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { perfmon } for pid=1522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit[1522]: AVC avc: denied { bpf } for pid=1522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:26.425000 audit: BPF prog-id=62 op=LOAD Sep 13 00:52:26.425000 audit[1522]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000354068 items=0 ppid=1500 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:26.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331376132353265393138643439386561333462303363636439643638 Sep 13 00:52:26.432071 env[1189]: time="2025-09-13T00:52:26.432021890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4f2tj,Uid:72b9bbb2-3418-4831-a3bd-3699a8ed214c,Namespace:calico-system,Attempt:0,} returns sandbox id \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\"" Sep 13 00:52:26.435199 env[1189]: time="2025-09-13T00:52:26.435156953Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\"" Sep 13 00:52:26.446627 env[1189]: time="2025-09-13T00:52:26.446582787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wsnq9,Uid:2821966d-6958-4f04-9d36-d4617b719919,Namespace:kube-system,Attempt:0,} returns sandbox id \"c17a252e918d498ea34b03ccd9d684a7dd308609ae1be01220b535d8ccbbdd34\"" Sep 13 00:52:26.447592 kubelet[1437]: E0913 00:52:26.447559 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Sep 13 00:52:26.455007 kubelet[1437]: E0913 00:52:26.454925 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:26.602014 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1117984133.mount: Deactivated successfully. Sep 13 00:52:26.633558 kubelet[1437]: E0913 00:52:26.633460 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:27.455696 kubelet[1437]: E0913 00:52:27.455602 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:27.550756 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1196340379.mount: Deactivated successfully. Sep 13 00:52:27.669049 env[1189]: time="2025-09-13T00:52:27.668912451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:27.670351 env[1189]: time="2025-09-13T00:52:27.670316909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:27.671453 env[1189]: time="2025-09-13T00:52:27.671425161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:27.672950 env[1189]: time="2025-09-13T00:52:27.672917820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:81bdfcd9dbd36624dc35354e8c181c75631ba40e6c7df5820f5f56cea36f0ef9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:27.673522 env[1189]: time="2025-09-13T00:52:27.673489141Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.3\" returns image reference \"sha256:4f2b088ed6fdfc6a97ac0650a4ba8171107d6656ce265c592e4c8423fd10e5c4\"" Sep 13 00:52:27.675680 env[1189]: time="2025-09-13T00:52:27.675644153Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Sep 13 00:52:27.678363 env[1189]: time="2025-09-13T00:52:27.678332381Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Sep 13 00:52:27.691392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3573454186.mount: Deactivated successfully. Sep 13 00:52:27.695239 env[1189]: time="2025-09-13T00:52:27.695187819Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d\"" Sep 13 00:52:27.695973 env[1189]: time="2025-09-13T00:52:27.695872098Z" level=info msg="StartContainer for \"26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d\"" Sep 13 00:52:27.720353 systemd[1]: Started cri-containerd-26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d.scope. Sep 13 00:52:27.734385 systemd[1]: run-containerd-runc-k8s.io-26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d-runc.8oc07N.mount: Deactivated successfully. Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.752429 kernel: kauditd_printk_skb: 356 callbacks suppressed Sep 13 00:52:27.752518 kernel: audit: type=1400 audit(1757724747.750:459): avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe4959ff1b8 items=0 ppid=1501 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:27.758215 kernel: audit: type=1300 audit(1757724747.750:459): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe4959ff1b8 items=0 ppid=1501 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:27.758289 kernel: audit: type=1327 audit(1757724747.750:459): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236633531383762643534633339336136623439663935306664643035 Sep 13 00:52:27.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236633531383762643534633339336136623439663935306664643035 Sep 13 00:52:27.761094 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.765572 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.767875 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.770280 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.770404 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.774666 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.777619 kernel: audit: type=1400 audit(1757724747.750:460): avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.750000 audit: BPF prog-id=63 op=LOAD Sep 13 00:52:27.750000 audit[1577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003a8428 items=0 ppid=1501 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:27.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236633531383762643534633339336136623439663935306664643035 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.754000 audit: BPF prog-id=64 op=LOAD Sep 13 00:52:27.754000 audit[1577]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003a8478 items=0 ppid=1501 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:27.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236633531383762643534633339336136623439663935306664643035 Sep 13 00:52:27.760000 audit: BPF prog-id=64 op=UNLOAD Sep 13 00:52:27.760000 audit: BPF prog-id=63 op=UNLOAD Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { perfmon } for pid=1577 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit[1577]: AVC avc: denied { bpf } for pid=1577 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:27.760000 audit: BPF prog-id=65 op=LOAD Sep 13 00:52:27.760000 audit[1577]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003a8508 items=0 ppid=1501 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:27.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236633531383762643534633339336136623439663935306664643035 Sep 13 00:52:27.792702 env[1189]: time="2025-09-13T00:52:27.792656213Z" level=info msg="StartContainer for \"26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d\" returns successfully" Sep 13 00:52:27.801406 systemd[1]: cri-containerd-26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d.scope: Deactivated successfully. Sep 13 00:52:27.805000 audit: BPF prog-id=65 op=UNLOAD Sep 13 00:52:27.837079 env[1189]: time="2025-09-13T00:52:27.837016048Z" level=info msg="shim disconnected" id=26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d Sep 13 00:52:27.837079 env[1189]: time="2025-09-13T00:52:27.837076589Z" level=warning msg="cleaning up after shim disconnected" id=26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d namespace=k8s.io Sep 13 00:52:27.837079 env[1189]: time="2025-09-13T00:52:27.837089511Z" level=info msg="cleaning up dead shim" Sep 13 00:52:27.847074 env[1189]: time="2025-09-13T00:52:27.847026044Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1617 runtime=io.containerd.runc.v2\n" Sep 13 00:52:28.456447 kubelet[1437]: E0913 00:52:28.456395 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:28.634006 kubelet[1437]: E0913 00:52:28.633957 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:28.688861 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-26c5187bd54c393a6b49f950fdd05140f7947c900a4ad439382b220f5c244d0d-rootfs.mount: Deactivated successfully. Sep 13 00:52:28.710242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2075633729.mount: Deactivated successfully. Sep 13 00:52:29.437615 env[1189]: time="2025-09-13T00:52:29.437541244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:29.439134 env[1189]: time="2025-09-13T00:52:29.439091530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:29.440081 env[1189]: time="2025-09-13T00:52:29.440053560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:29.441190 env[1189]: time="2025-09-13T00:52:29.441140137Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:29.441923 env[1189]: time="2025-09-13T00:52:29.441882053Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Sep 13 00:52:29.443988 env[1189]: time="2025-09-13T00:52:29.443878880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\"" Sep 13 00:52:29.444962 env[1189]: time="2025-09-13T00:52:29.444926327Z" level=info msg="CreateContainer within sandbox \"c17a252e918d498ea34b03ccd9d684a7dd308609ae1be01220b535d8ccbbdd34\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Sep 13 00:52:29.455581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3932165809.mount: Deactivated successfully. Sep 13 00:52:29.456800 kubelet[1437]: E0913 00:52:29.456759 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:29.462571 env[1189]: time="2025-09-13T00:52:29.462530420Z" level=info msg="CreateContainer within sandbox \"c17a252e918d498ea34b03ccd9d684a7dd308609ae1be01220b535d8ccbbdd34\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"98f20bd358334f975e84dd098badd09e698a7cd7536eed1c246b8649ae700a64\"" Sep 13 00:52:29.463249 env[1189]: time="2025-09-13T00:52:29.463204941Z" level=info msg="StartContainer for \"98f20bd358334f975e84dd098badd09e698a7cd7536eed1c246b8649ae700a64\"" Sep 13 00:52:29.489332 systemd[1]: Started cri-containerd-98f20bd358334f975e84dd098badd09e698a7cd7536eed1c246b8649ae700a64.scope. Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f2d305c4ac8 items=0 ppid=1500 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938663230626433353833333466393735653834646430393862616464 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.517000 audit: BPF prog-id=66 op=LOAD Sep 13 00:52:29.517000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00034dd58 items=0 ppid=1500 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938663230626433353833333466393735653834646430393862616464 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.518000 audit: BPF prog-id=67 op=LOAD Sep 13 00:52:29.518000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00034dda8 items=0 ppid=1500 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938663230626433353833333466393735653834646430393862616464 Sep 13 00:52:29.519000 audit: BPF prog-id=67 op=UNLOAD Sep 13 00:52:29.519000 audit: BPF prog-id=66 op=UNLOAD Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:29.519000 audit: BPF prog-id=68 op=LOAD Sep 13 00:52:29.519000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00034de38 items=0 ppid=1500 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938663230626433353833333466393735653834646430393862616464 Sep 13 00:52:29.542195 env[1189]: time="2025-09-13T00:52:29.542139903Z" level=info msg="StartContainer for \"98f20bd358334f975e84dd098badd09e698a7cd7536eed1c246b8649ae700a64\" returns successfully" Sep 13 00:52:29.647567 kubelet[1437]: E0913 00:52:29.647533 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Sep 13 00:52:29.673000 audit[1701]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.673000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb8fedb30 a2=0 a3=7ffeb8fedb1c items=0 ppid=1653 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:29.674000 audit[1703]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.674000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6dcb18a0 a2=0 a3=7ffc6dcb188c items=0 ppid=1653 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:29.675000 audit[1704]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.675000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6708d370 a2=0 a3=7ffc6708d35c items=0 ppid=1653 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Sep 13 00:52:29.676000 audit[1705]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.676000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdd52e750 a2=0 a3=7fffdd52e73c items=0 ppid=1653 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:29.678000 audit[1706]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.678000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb6f474c0 a2=0 a3=7ffdb6f474ac items=0 ppid=1653 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Sep 13 00:52:29.679000 audit[1707]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.679000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3fbae830 a2=0 a3=7ffd3fbae81c items=0 ppid=1653 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Sep 13 00:52:29.689013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3732902642.mount: Deactivated successfully. Sep 13 00:52:29.781000 audit[1708]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.781000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcab6e5cc0 a2=0 a3=7ffcab6e5cac items=0 ppid=1653 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:29.790000 audit[1710]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.790000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe0932e800 a2=0 a3=7ffe0932e7ec items=0 ppid=1653 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Sep 13 00:52:29.795000 audit[1713]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.795000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff2b437140 a2=0 a3=7fff2b43712c items=0 ppid=1653 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Sep 13 00:52:29.797000 audit[1714]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.797000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff83e52510 a2=0 a3=7fff83e524fc items=0 ppid=1653 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:29.801000 audit[1716]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.801000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7fe1ef90 a2=0 a3=7ffe7fe1ef7c items=0 ppid=1653 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.801000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:29.802000 audit[1717]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.802000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe155aa8d0 a2=0 a3=7ffe155aa8bc items=0 ppid=1653 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:29.806000 audit[1719]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.806000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd18b2d500 a2=0 a3=7ffd18b2d4ec items=0 ppid=1653 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.806000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:29.811000 audit[1722]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.811000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec71422c0 a2=0 a3=7ffec71422ac items=0 ppid=1653 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Sep 13 00:52:29.813000 audit[1723]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.813000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe771399e0 a2=0 a3=7ffe771399cc items=0 ppid=1653 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.813000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:29.816000 audit[1725]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.816000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd3731080 a2=0 a3=7fffd373106c items=0 ppid=1653 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:29.818000 audit[1726]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.818000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdf183620 a2=0 a3=7fffdf18360c items=0 ppid=1653 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.818000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:29.820000 audit[1728]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.820000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc36b7c10 a2=0 a3=7ffcc36b7bfc items=0 ppid=1653 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:29.824000 audit[1731]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.824000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2d7ec5e0 a2=0 a3=7ffc2d7ec5cc items=0 ppid=1653 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:29.829000 audit[1734]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.829000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd433e3fc0 a2=0 a3=7ffd433e3fac items=0 ppid=1653 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:29.831000 audit[1735]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.831000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7daca720 a2=0 a3=7fff7daca70c items=0 ppid=1653 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:29.834000 audit[1737]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.834000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc0f6560b0 a2=0 a3=7ffc0f65609c items=0 ppid=1653 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.834000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:29.861000 audit[1741]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.861000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd91a3eda0 a2=0 a3=7ffd91a3ed8c items=0 ppid=1653 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:29.862000 audit[1742]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.862000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe60aa4760 a2=0 a3=7ffe60aa474c items=0 ppid=1653 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:29.865000 audit[1744]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Sep 13 00:52:29.865000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdd8719460 a2=0 a3=7ffdd871944c items=0 ppid=1653 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:29.896000 audit[1750]: NETFILTER_CFG table=filter:39 family=2 entries=7 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.896000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffefc38f830 a2=0 a3=7ffefc38f81c items=0 ppid=1653 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.896000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.927000 audit[1750]: NETFILTER_CFG table=nat:40 family=2 entries=61 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:29.927000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=29052 a0=3 a1=7ffefc38f830 a2=0 a3=7ffefc38f81c items=0 ppid=1653 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:29.941000 audit[1759]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.941000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdd11d9d70 a2=0 a3=7ffdd11d9d5c items=0 ppid=1653 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Sep 13 00:52:29.946000 audit[1761]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.946000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc06a9b5b0 a2=0 a3=7ffc06a9b59c items=0 ppid=1653 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Sep 13 00:52:29.951000 audit[1764]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.951000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8de2b910 a2=0 a3=7ffe8de2b8fc items=0 ppid=1653 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Sep 13 00:52:29.954000 audit[1765]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.954000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8ed08b20 a2=0 a3=7ffc8ed08b0c items=0 ppid=1653 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Sep 13 00:52:29.957000 audit[1767]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.957000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeac4a8f30 a2=0 a3=7ffeac4a8f1c items=0 ppid=1653 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Sep 13 00:52:29.959000 audit[1768]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.959000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbbce3470 a2=0 a3=7fffbbce345c items=0 ppid=1653 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Sep 13 00:52:29.962000 audit[1770]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.962000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffecf2dfe30 a2=0 a3=7ffecf2dfe1c items=0 ppid=1653 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Sep 13 00:52:29.966000 audit[1773]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.966000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff21084e80 a2=0 a3=7fff21084e6c items=0 ppid=1653 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Sep 13 00:52:29.967000 audit[1774]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.967000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdece72900 a2=0 a3=7ffdece728ec items=0 ppid=1653 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Sep 13 00:52:29.971000 audit[1776]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.971000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc725b2220 a2=0 a3=7ffc725b220c items=0 ppid=1653 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Sep 13 00:52:29.973000 audit[1777]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.973000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe93e284d0 a2=0 a3=7ffe93e284bc items=0 ppid=1653 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Sep 13 00:52:29.976000 audit[1779]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.976000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcff069460 a2=0 a3=7ffcff06944c items=0 ppid=1653 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Sep 13 00:52:29.980000 audit[1782]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.980000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc867aaa40 a2=0 a3=7ffc867aaa2c items=0 ppid=1653 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Sep 13 00:52:29.984000 audit[1785]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.984000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeacbc9120 a2=0 a3=7ffeacbc910c items=0 ppid=1653 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Sep 13 00:52:29.985000 audit[1786]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.985000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3a8c6e80 a2=0 a3=7ffd3a8c6e6c items=0 ppid=1653 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Sep 13 00:52:29.988000 audit[1788]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.988000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe1bb19c60 a2=0 a3=7ffe1bb19c4c items=0 ppid=1653 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:29.992000 audit[1791]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.992000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffde6b1f7c0 a2=0 a3=7ffde6b1f7ac items=0 ppid=1653 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Sep 13 00:52:29.993000 audit[1792]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.993000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0e1d6730 a2=0 a3=7ffc0e1d671c items=0 ppid=1653 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.993000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Sep 13 00:52:29.996000 audit[1794]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.996000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdb472b7a0 a2=0 a3=7ffdb472b78c items=0 ppid=1653 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Sep 13 00:52:29.997000 audit[1795]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:29.997000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcaee8e1d0 a2=0 a3=7ffcaee8e1bc items=0 ppid=1653 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:29.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Sep 13 00:52:30.000000 audit[1797]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:30.000000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd37169bc0 a2=0 a3=7ffd37169bac items=0 ppid=1653 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:30.004000 audit[1800]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Sep 13 00:52:30.004000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd7ef26cf0 a2=0 a3=7ffd7ef26cdc items=0 ppid=1653 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Sep 13 00:52:30.008000 audit[1802]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:30.008000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc05f312b0 a2=0 a3=7ffc05f3129c items=0 ppid=1653 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.008000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.010000 audit[1802]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Sep 13 00:52:30.010000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc05f312b0 a2=0 a3=7ffc05f3129c items=0 ppid=1653 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:30.010000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:30.457936 kubelet[1437]: E0913 00:52:30.457863 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:30.633592 kubelet[1437]: E0913 00:52:30.633281 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:30.648720 kubelet[1437]: E0913 00:52:30.648639 1437 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Sep 13 00:52:31.458722 kubelet[1437]: E0913 00:52:31.458641 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:32.459920 kubelet[1437]: E0913 00:52:32.459806 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:32.633413 kubelet[1437]: E0913 00:52:32.632958 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:32.633678 env[1189]: time="2025-09-13T00:52:32.633644796Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.634654 env[1189]: time="2025-09-13T00:52:32.634626122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.635744 env[1189]: time="2025-09-13T00:52:32.635719787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.636270 env[1189]: time="2025-09-13T00:52:32.636234947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.3\" returns image reference \"sha256:034822460c2f667e1f4a7679c843cc35ce1bf2c25dec86f04e07fb403df7e458\"" Sep 13 00:52:32.636795 env[1189]: time="2025-09-13T00:52:32.636769961Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:73d1e391050490d54e5bee8ff2b1a50a8be1746c98dc530361b00e8c0ab63f87,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:32.638944 env[1189]: time="2025-09-13T00:52:32.638917826Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Sep 13 00:52:32.649341 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3226937017.mount: Deactivated successfully. Sep 13 00:52:32.662552 env[1189]: time="2025-09-13T00:52:32.662497028Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9\"" Sep 13 00:52:32.663385 env[1189]: time="2025-09-13T00:52:32.663355582Z" level=info msg="StartContainer for \"d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9\"" Sep 13 00:52:32.689839 systemd[1]: Started cri-containerd-d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9.scope. Sep 13 00:52:32.716000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.716000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f14fdc80328 items=0 ppid=1501 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306632373732653438623062396539346237383664326635613361 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.717000 audit: BPF prog-id=69 op=LOAD Sep 13 00:52:32.717000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000243f98 items=0 ppid=1501 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306632373732653438623062396539346237383664326635613361 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.718000 audit: BPF prog-id=70 op=LOAD Sep 13 00:52:32.718000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000243fe8 items=0 ppid=1501 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306632373732653438623062396539346237383664326635613361 Sep 13 00:52:32.718000 audit: BPF prog-id=70 op=UNLOAD Sep 13 00:52:32.719000 audit: BPF prog-id=69 op=UNLOAD Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { perfmon } for pid=1811 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit[1811]: AVC avc: denied { bpf } for pid=1811 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:32.719000 audit: BPF prog-id=71 op=LOAD Sep 13 00:52:32.719000 audit[1811]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ac078 items=0 ppid=1501 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:32.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434306632373732653438623062396539346237383664326635613361 Sep 13 00:52:32.741504 env[1189]: time="2025-09-13T00:52:32.741458895Z" level=info msg="StartContainer for \"d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9\" returns successfully" Sep 13 00:52:33.364409 env[1189]: time="2025-09-13T00:52:33.364345530Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 13 00:52:33.368122 systemd[1]: cri-containerd-d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9.scope: Deactivated successfully. Sep 13 00:52:33.374213 kernel: kauditd_printk_skb: 273 callbacks suppressed Sep 13 00:52:33.374392 kernel: audit: type=1334 audit(1757724753.371:529): prog-id=71 op=UNLOAD Sep 13 00:52:33.371000 audit: BPF prog-id=71 op=UNLOAD Sep 13 00:52:33.391721 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9-rootfs.mount: Deactivated successfully. Sep 13 00:52:33.432506 env[1189]: time="2025-09-13T00:52:33.432453449Z" level=info msg="shim disconnected" id=d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9 Sep 13 00:52:33.432848 env[1189]: time="2025-09-13T00:52:33.432826111Z" level=warning msg="cleaning up after shim disconnected" id=d40f2772e48b0b9e94b786d2f5a3a8774606936edf5f21f4ad0e2f47fb8b83c9 namespace=k8s.io Sep 13 00:52:33.432935 env[1189]: time="2025-09-13T00:52:33.432919960Z" level=info msg="cleaning up dead shim" Sep 13 00:52:33.440333 kubelet[1437]: I0913 00:52:33.440040 1437 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Sep 13 00:52:33.443202 env[1189]: time="2025-09-13T00:52:33.443149776Z" level=warning msg="cleanup warnings time=\"2025-09-13T00:52:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1851 runtime=io.containerd.runc.v2\n" Sep 13 00:52:33.460195 kubelet[1437]: E0913 00:52:33.460121 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:33.665527 env[1189]: time="2025-09-13T00:52:33.665368672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\"" Sep 13 00:52:33.699999 kubelet[1437]: I0913 00:52:33.699916 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-wsnq9" podStartSLOduration=7.7056961170000005 podStartE2EDuration="10.699897187s" podCreationTimestamp="2025-09-13 00:52:23 +0000 UTC" firstStartedPulling="2025-09-13 00:52:26.448567441 +0000 UTC m=+3.423146620" lastFinishedPulling="2025-09-13 00:52:29.442768498 +0000 UTC m=+6.417347690" observedRunningTime="2025-09-13 00:52:29.666432447 +0000 UTC m=+6.641011646" watchObservedRunningTime="2025-09-13 00:52:33.699897187 +0000 UTC m=+10.674476395" Sep 13 00:52:34.461095 kubelet[1437]: E0913 00:52:34.461034 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:34.498000 audit[1865]: NETFILTER_CFG table=filter:65 family=2 entries=12 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:34.498000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd8d1bcdb0 a2=0 a3=7ffd8d1bcd9c items=0 ppid=1653 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:34.505157 kernel: audit: type=1325 audit(1757724754.498:530): table=filter:65 family=2 entries=12 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:34.505240 kernel: audit: type=1300 audit(1757724754.498:530): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd8d1bcdb0 a2=0 a3=7ffd8d1bcd9c items=0 ppid=1653 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:34.505267 kernel: audit: type=1327 audit(1757724754.498:530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:34.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:34.508102 kernel: audit: type=1325 audit(1757724754.506:531): table=nat:66 family=2 entries=22 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:34.506000 audit[1865]: NETFILTER_CFG table=nat:66 family=2 entries=22 op=nft_register_rule pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:52:34.506000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8d1bcdb0 a2=0 a3=7ffd8d1bcd9c items=0 ppid=1653 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:34.513009 kernel: audit: type=1300 audit(1757724754.506:531): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd8d1bcdb0 a2=0 a3=7ffd8d1bcd9c items=0 ppid=1653 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:34.513091 kernel: audit: type=1327 audit(1757724754.506:531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:34.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:52:34.637647 systemd[1]: Created slice kubepods-besteffort-pod51a013dc_6244_4047_ae4c_28cabcf3140a.slice. Sep 13 00:52:34.640159 env[1189]: time="2025-09-13T00:52:34.640118794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kx9d4,Uid:51a013dc-6244-4047-ae4c-28cabcf3140a,Namespace:calico-system,Attempt:0,}" Sep 13 00:52:34.709937 env[1189]: time="2025-09-13T00:52:34.709856135Z" level=error msg="Failed to destroy network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:34.714345 env[1189]: time="2025-09-13T00:52:34.712773835Z" level=error msg="encountered an error cleaning up failed sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:34.714345 env[1189]: time="2025-09-13T00:52:34.712844562Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kx9d4,Uid:51a013dc-6244-4047-ae4c-28cabcf3140a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:34.711875 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82-shm.mount: Deactivated successfully. Sep 13 00:52:34.714593 kubelet[1437]: E0913 00:52:34.713687 1437 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:34.714593 kubelet[1437]: E0913 00:52:34.713802 1437 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:34.714593 kubelet[1437]: E0913 00:52:34.713836 1437 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kx9d4" Sep 13 00:52:34.714698 kubelet[1437]: E0913 00:52:34.713896 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kx9d4_calico-system(51a013dc-6244-4047-ae4c-28cabcf3140a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kx9d4_calico-system(51a013dc-6244-4047-ae4c-28cabcf3140a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:35.461819 kubelet[1437]: E0913 00:52:35.461745 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:35.667509 kubelet[1437]: I0913 00:52:35.667476 1437 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:35.668228 env[1189]: time="2025-09-13T00:52:35.668192832Z" level=info msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" Sep 13 00:52:35.720288 env[1189]: time="2025-09-13T00:52:35.720159149Z" level=error msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" failed" error="failed to destroy network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:35.721110 kubelet[1437]: E0913 00:52:35.721067 1437 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:35.721218 kubelet[1437]: E0913 00:52:35.721140 1437 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82"} Sep 13 00:52:35.721218 kubelet[1437]: E0913 00:52:35.721199 1437 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"51a013dc-6244-4047-ae4c-28cabcf3140a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:35.721334 kubelet[1437]: E0913 00:52:35.721238 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"51a013dc-6244-4047-ae4c-28cabcf3140a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kx9d4" podUID="51a013dc-6244-4047-ae4c-28cabcf3140a" Sep 13 00:52:36.462576 kubelet[1437]: E0913 00:52:36.462528 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:37.463346 kubelet[1437]: E0913 00:52:37.463240 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:37.709484 systemd[1]: Created slice kubepods-besteffort-pod0b419cbd_cc2b_4fcb_b303_68389502eea2.slice. Sep 13 00:52:37.775932 kubelet[1437]: I0913 00:52:37.775891 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ndflc\" (UniqueName: \"kubernetes.io/projected/0b419cbd-cc2b-4fcb-b303-68389502eea2-kube-api-access-ndflc\") pod \"nginx-deployment-7fcdb87857-shj29\" (UID: \"0b419cbd-cc2b-4fcb-b303-68389502eea2\") " pod="default/nginx-deployment-7fcdb87857-shj29" Sep 13 00:52:38.014416 env[1189]: time="2025-09-13T00:52:38.014369292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-shj29,Uid:0b419cbd-cc2b-4fcb-b303-68389502eea2,Namespace:default,Attempt:0,}" Sep 13 00:52:38.125399 env[1189]: time="2025-09-13T00:52:38.125234406Z" level=error msg="Failed to destroy network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:38.127514 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9-shm.mount: Deactivated successfully. Sep 13 00:52:38.129758 env[1189]: time="2025-09-13T00:52:38.129691266Z" level=error msg="encountered an error cleaning up failed sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:38.129930 env[1189]: time="2025-09-13T00:52:38.129901639Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-shj29,Uid:0b419cbd-cc2b-4fcb-b303-68389502eea2,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:38.130736 kubelet[1437]: E0913 00:52:38.130252 1437 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:38.130736 kubelet[1437]: E0913 00:52:38.130405 1437 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-shj29" Sep 13 00:52:38.130736 kubelet[1437]: E0913 00:52:38.130430 1437 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-7fcdb87857-shj29" Sep 13 00:52:38.130904 kubelet[1437]: E0913 00:52:38.130474 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-7fcdb87857-shj29_default(0b419cbd-cc2b-4fcb-b303-68389502eea2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-7fcdb87857-shj29_default(0b419cbd-cc2b-4fcb-b303-68389502eea2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-shj29" podUID="0b419cbd-cc2b-4fcb-b303-68389502eea2" Sep 13 00:52:38.463983 kubelet[1437]: E0913 00:52:38.463839 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:38.673560 kubelet[1437]: I0913 00:52:38.673021 1437 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:38.674034 env[1189]: time="2025-09-13T00:52:38.673993443Z" level=info msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" Sep 13 00:52:38.719322 env[1189]: time="2025-09-13T00:52:38.719169498Z" level=error msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" failed" error="failed to destroy network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Sep 13 00:52:38.719657 kubelet[1437]: E0913 00:52:38.719618 1437 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:38.719748 kubelet[1437]: E0913 00:52:38.719676 1437 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9"} Sep 13 00:52:38.719748 kubelet[1437]: E0913 00:52:38.719714 1437 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b419cbd-cc2b-4fcb-b303-68389502eea2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Sep 13 00:52:38.719851 kubelet[1437]: E0913 00:52:38.719740 1437 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b419cbd-cc2b-4fcb-b303-68389502eea2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-7fcdb87857-shj29" podUID="0b419cbd-cc2b-4fcb-b303-68389502eea2" Sep 13 00:52:39.464738 kubelet[1437]: E0913 00:52:39.464663 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:39.848507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount407785314.mount: Deactivated successfully. Sep 13 00:52:39.879077 env[1189]: time="2025-09-13T00:52:39.879010545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.881490 env[1189]: time="2025-09-13T00:52:39.881445973Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.883505 env[1189]: time="2025-09-13T00:52:39.883455648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.885829 env[1189]: time="2025-09-13T00:52:39.885776809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:bcb8146fcaeced1e1c88fad3eaa697f1680746bd23c3e7e8d4535bc484c6f2a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:39.887294 env[1189]: time="2025-09-13T00:52:39.887237787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.3\" returns image reference \"sha256:ce9c4ac0f175f22c56e80844e65379d9ebe1d8a4e2bbb38dc1db0f53a8826f0f\"" Sep 13 00:52:39.905263 env[1189]: time="2025-09-13T00:52:39.905202904Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Sep 13 00:52:39.915982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2728320617.mount: Deactivated successfully. Sep 13 00:52:39.919526 env[1189]: time="2025-09-13T00:52:39.919473886Z" level=info msg="CreateContainer within sandbox \"88a392a6983283ac67de977ec50005555466d464010b1871510ef4fe140a46a3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f\"" Sep 13 00:52:39.920273 env[1189]: time="2025-09-13T00:52:39.920242179Z" level=info msg="StartContainer for \"6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f\"" Sep 13 00:52:39.939526 systemd[1]: Started cri-containerd-6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f.scope. Sep 13 00:52:39.975547 kernel: audit: type=1400 audit(1757724759.964:532): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975738 kernel: audit: type=1300 audit(1757724759.964:532): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff4685544d8 items=0 ppid=1501 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.975784 kernel: audit: type=1327 audit(1757724759.964:532): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393336396361323739633333646232313233616463326637616263 Sep 13 00:52:39.975819 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ff4685544d8 items=0 ppid=1501 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393336396361323739633333646232313233616463326637616263 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.978343 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.981089 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.983593 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.983680 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.990973 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.991073 kernel: audit: type=1400 audit(1757724759.964:533): avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.964000 audit: BPF prog-id=72 op=LOAD Sep 13 00:52:39.964000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002187c8 items=0 ppid=1501 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393336396361323739633333646232313233616463326637616263 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.973000 audit: BPF prog-id=73 op=LOAD Sep 13 00:52:39.973000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000218818 items=0 ppid=1501 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393336396361323739633333646232313233616463326637616263 Sep 13 00:52:39.975000 audit: BPF prog-id=73 op=UNLOAD Sep 13 00:52:39.975000 audit: BPF prog-id=72 op=UNLOAD Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { perfmon } for pid=1966 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit[1966]: AVC avc: denied { bpf } for pid=1966 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:39.975000 audit: BPF prog-id=74 op=LOAD Sep 13 00:52:39.975000 audit[1966]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002188a8 items=0 ppid=1501 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:39.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662393336396361323739633333646232313233616463326637616263 Sep 13 00:52:40.001971 env[1189]: time="2025-09-13T00:52:40.001914196Z" level=info msg="StartContainer for \"6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f\" returns successfully" Sep 13 00:52:40.103406 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Sep 13 00:52:40.103575 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Sep 13 00:52:40.465929 kubelet[1437]: E0913 00:52:40.465831 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:40.697580 kubelet[1437]: I0913 00:52:40.697396 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-4f2tj" podStartSLOduration=4.242618447 podStartE2EDuration="17.6973793s" podCreationTimestamp="2025-09-13 00:52:23 +0000 UTC" firstStartedPulling="2025-09-13 00:52:26.434630843 +0000 UTC m=+3.409210022" lastFinishedPulling="2025-09-13 00:52:39.889391683 +0000 UTC m=+16.863970875" observedRunningTime="2025-09-13 00:52:40.697034862 +0000 UTC m=+17.671614062" watchObservedRunningTime="2025-09-13 00:52:40.6973793 +0000 UTC m=+17.671958498" Sep 13 00:52:41.451000 audit[2080]: AVC avc: denied { write } for pid=2080 comm="tee" name="fd" dev="proc" ino=19379 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.454000 audit[2085]: AVC avc: denied { write } for pid=2085 comm="tee" name="fd" dev="proc" ino=19382 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.451000 audit[2080]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2defe7c6 a2=241 a3=1b6 items=1 ppid=2051 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.451000 audit: CWD cwd="/etc/service/enabled/bird/log" Sep 13 00:52:41.451000 audit: PATH item=0 name="/dev/fd/63" inode=19366 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.451000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.456000 audit[2087]: AVC avc: denied { write } for pid=2087 comm="tee" name="fd" dev="proc" ino=19386 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.454000 audit[2085]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd142f87c7 a2=241 a3=1b6 items=1 ppid=2060 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.454000 audit: CWD cwd="/etc/service/enabled/cni/log" Sep 13 00:52:41.454000 audit: PATH item=0 name="/dev/fd/63" inode=19373 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.454000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.456000 audit[2087]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5b2f77b6 a2=241 a3=1b6 items=1 ppid=2053 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.456000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Sep 13 00:52:41.456000 audit: PATH item=0 name="/dev/fd/63" inode=19376 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.456000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.461000 audit[2091]: AVC avc: denied { write } for pid=2091 comm="tee" name="fd" dev="proc" ino=19394 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.461000 audit[2091]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffffaf9a7c5 a2=241 a3=1b6 items=1 ppid=2064 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.461000 audit: CWD cwd="/etc/service/enabled/bird6/log" Sep 13 00:52:41.461000 audit: PATH item=0 name="/dev/fd/63" inode=19389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.466427 kubelet[1437]: E0913 00:52:41.466366 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:41.465000 audit[2098]: AVC avc: denied { write } for pid=2098 comm="tee" name="fd" dev="proc" ino=19398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.465000 audit[2098]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe91d2d7c5 a2=241 a3=1b6 items=1 ppid=2054 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.465000 audit: CWD cwd="/etc/service/enabled/confd/log" Sep 13 00:52:41.465000 audit: PATH item=0 name="/dev/fd/63" inode=19732 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.465000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.471000 audit[2106]: AVC avc: denied { write } for pid=2106 comm="tee" name="fd" dev="proc" ino=19404 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.478000 audit[2101]: AVC avc: denied { write } for pid=2101 comm="tee" name="fd" dev="proc" ino=19408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Sep 13 00:52:41.471000 audit[2106]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff45dee7c5 a2=241 a3=1b6 items=1 ppid=2058 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.471000 audit: CWD cwd="/etc/service/enabled/felix/log" Sep 13 00:52:41.471000 audit: PATH item=0 name="/dev/fd/63" inode=19401 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.471000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.478000 audit[2101]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbee3e7b5 a2=241 a3=1b6 items=1 ppid=2055 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.478000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Sep 13 00:52:41.478000 audit: PATH item=0 name="/dev/fd/63" inode=19400 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:52:41.478000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Sep 13 00:52:41.701099 systemd[1]: run-containerd-runc-k8s.io-6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f-runc.JuNsr3.mount: Deactivated successfully. Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.802000 audit: BPF prog-id=75 op=LOAD Sep 13 00:52:41.802000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0aa9390 a2=98 a3=1fffffffffffffff items=0 ppid=2065 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.802000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:41.803000 audit: BPF prog-id=75 op=UNLOAD Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.803000 audit: BPF prog-id=76 op=LOAD Sep 13 00:52:41.803000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0aa9270 a2=94 a3=3 items=0 ppid=2065 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.803000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:41.804000 audit: BPF prog-id=76 op=UNLOAD Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { bpf } for pid=2178 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit: BPF prog-id=77 op=LOAD Sep 13 00:52:41.804000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef0aa92b0 a2=94 a3=7ffef0aa9490 items=0 ppid=2065 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:41.804000 audit: BPF prog-id=77 op=UNLOAD Sep 13 00:52:41.804000 audit[2178]: AVC avc: denied { perfmon } for pid=2178 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.804000 audit[2178]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffef0aa9380 a2=50 a3=a000000085 items=0 ppid=2065 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.812000 audit: BPF prog-id=78 op=LOAD Sep 13 00:52:41.812000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfb392d50 a2=98 a3=3 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.813000 audit: BPF prog-id=78 op=UNLOAD Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.813000 audit: BPF prog-id=79 op=LOAD Sep 13 00:52:41.813000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfb392b40 a2=94 a3=54428f items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.813000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.814000 audit: BPF prog-id=79 op=UNLOAD Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.814000 audit: BPF prog-id=80 op=LOAD Sep 13 00:52:41.814000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfb392b70 a2=94 a3=2 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.814000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.814000 audit: BPF prog-id=80 op=UNLOAD Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.944000 audit: BPF prog-id=81 op=LOAD Sep 13 00:52:41.944000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfb392a30 a2=94 a3=1 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.945000 audit: BPF prog-id=81 op=UNLOAD Sep 13 00:52:41.945000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.945000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfb392b00 a2=50 a3=7ffdfb392be0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.945000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392a40 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfb392a70 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfb392980 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392a90 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392a70 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392a60 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392a90 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfb392a70 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfb392a90 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfb392a60 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.955000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.955000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfb392ad0 a2=28 a3=0 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.955000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfb392880 a2=50 a3=1 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit: BPF prog-id=82 op=LOAD Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfb392880 a2=94 a3=5 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit: BPF prog-id=82 op=UNLOAD Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfb392930 a2=50 a3=1 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdfb392a50 a2=4 a3=38 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { confidentiality } for pid=2179 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfb392aa0 a2=94 a3=6 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { confidentiality } for pid=2179 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfb392250 a2=94 a3=88 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { perfmon } for pid=2179 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { bpf } for pid=2179 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.956000 audit[2179]: AVC avc: denied { confidentiality } for pid=2179 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:41.956000 audit[2179]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfb392250 a2=94 a3=88 items=0 ppid=2065 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.956000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.966000 audit: BPF prog-id=83 op=LOAD Sep 13 00:52:41.966000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed59c59b0 a2=98 a3=1999999999999999 items=0 ppid=2065 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.966000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:41.967000 audit: BPF prog-id=83 op=UNLOAD Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.967000 audit: BPF prog-id=84 op=LOAD Sep 13 00:52:41.967000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed59c5890 a2=94 a3=ffff items=0 ppid=2065 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.967000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:41.968000 audit: BPF prog-id=84 op=UNLOAD Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:41.968000 audit: BPF prog-id=85 op=LOAD Sep 13 00:52:41.968000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffed59c58d0 a2=94 a3=7ffed59c5ab0 items=0 ppid=2065 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:41.968000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Sep 13 00:52:41.968000 audit: BPF prog-id=85 op=UNLOAD Sep 13 00:52:42.045513 systemd-networkd[1005]: vxlan.calico: Link UP Sep 13 00:52:42.045522 systemd-networkd[1005]: vxlan.calico: Gained carrier Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit: BPF prog-id=86 op=LOAD Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd41f29fc0 a2=98 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit: BPF prog-id=86 op=UNLOAD Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit: BPF prog-id=87 op=LOAD Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd41f29dd0 a2=94 a3=54428f items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit: BPF prog-id=87 op=UNLOAD Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit: BPF prog-id=88 op=LOAD Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd41f29e00 a2=94 a3=2 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit: BPF prog-id=88 op=UNLOAD Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29cd0 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41f29d00 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41f29c10 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29d20 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29d00 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29cf0 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29d20 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41f29d00 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41f29d20 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd41f29cf0 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.072000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.072000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd41f29d60 a2=28 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.072000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.073000 audit: BPF prog-id=89 op=LOAD Sep 13 00:52:42.073000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd41f29bd0 a2=94 a3=0 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.073000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.073000 audit: BPF prog-id=89 op=UNLOAD Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd41f29bc0 a2=50 a3=2800 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd41f29bc0 a2=50 a3=2800 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit: BPF prog-id=90 op=LOAD Sep 13 00:52:42.074000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd41f293e0 a2=94 a3=2 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.074000 audit: BPF prog-id=90 op=UNLOAD Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.074000 audit: BPF prog-id=91 op=LOAD Sep 13 00:52:42.074000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd41f294e0 a2=94 a3=30 items=0 ppid=2065 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit: BPF prog-id=92 op=LOAD Sep 13 00:52:42.085000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc82c1370 a2=98 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.085000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.085000 audit: BPF prog-id=92 op=UNLOAD Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.085000 audit: BPF prog-id=93 op=LOAD Sep 13 00:52:42.085000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc82c1160 a2=94 a3=54428f items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.085000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.086000 audit: BPF prog-id=93 op=UNLOAD Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.086000 audit: BPF prog-id=94 op=LOAD Sep 13 00:52:42.086000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc82c1190 a2=94 a3=2 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.086000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.086000 audit: BPF prog-id=94 op=UNLOAD Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.229000 audit: BPF prog-id=95 op=LOAD Sep 13 00:52:42.229000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc82c1050 a2=94 a3=1 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.230000 audit: BPF prog-id=95 op=UNLOAD Sep 13 00:52:42.230000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.230000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc82c1120 a2=50 a3=7ffcc82c1200 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.230000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.244000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.244000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c1060 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.244000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.244000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc82c1090 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.244000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.244000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc82c0fa0 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.244000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c10b0 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c1090 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c1080 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c10b0 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc82c1090 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.245000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.245000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc82c10b0 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.245000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.246000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.246000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc82c1080 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.246000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.246000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc82c10f0 a2=28 a3=0 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.246000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc82c0ea0 a2=50 a3=1 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.247000 audit: BPF prog-id=96 op=LOAD Sep 13 00:52:42.247000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc82c0ea0 a2=94 a3=5 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.247000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.248000 audit: BPF prog-id=96 op=UNLOAD Sep 13 00:52:42.248000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.248000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc82c0f50 a2=50 a3=1 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.248000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.248000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcc82c1070 a2=4 a3=38 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.248000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.249000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:42.249000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc82c10c0 a2=94 a3=6 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.249000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.250000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:42.250000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc82c0870 a2=94 a3=88 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.250000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { perfmon } for pid=2216 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.251000 audit[2216]: AVC avc: denied { confidentiality } for pid=2216 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:52:42.251000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc82c0870 a2=94 a3=88 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.251000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.252000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.252000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc82c22a0 a2=10 a3=f8f00800 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.252000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.253000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.253000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc82c2140 a2=10 a3=3 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.253000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.253000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.253000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc82c20e0 a2=10 a3=3 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.253000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.253000 audit[2216]: AVC avc: denied { bpf } for pid=2216 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:42.253000 audit[2216]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcc82c20e0 a2=10 a3=7 items=0 ppid=2065 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.253000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Sep 13 00:52:42.261000 audit: BPF prog-id=91 op=UNLOAD Sep 13 00:52:42.340000 audit[2239]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:42.340000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc32d63b20 a2=0 a3=7ffc32d63b0c items=0 ppid=2065 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.340000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:42.350000 audit[2237]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:42.350000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd47582550 a2=0 a3=7ffd4758253c items=0 ppid=2065 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.350000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:42.353000 audit[2240]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:42.353000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe8fdaf500 a2=0 a3=7ffe8fdaf4ec items=0 ppid=2065 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.353000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:42.359000 audit[2238]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:42.359000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff77045910 a2=0 a3=7fff770458fc items=0 ppid=2065 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:42.359000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:42.467497 kubelet[1437]: E0913 00:52:42.467399 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:42.701408 systemd[1]: run-containerd-runc-k8s.io-6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f-runc.qtnTsX.mount: Deactivated successfully. Sep 13 00:52:43.451166 kubelet[1437]: E0913 00:52:43.451104 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:43.468028 kubelet[1437]: E0913 00:52:43.467969 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:43.545430 systemd-networkd[1005]: vxlan.calico: Gained IPv6LL Sep 13 00:52:44.468705 kubelet[1437]: E0913 00:52:44.468657 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:45.469918 kubelet[1437]: E0913 00:52:45.469839 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:46.470907 kubelet[1437]: E0913 00:52:46.470833 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:47.471840 kubelet[1437]: E0913 00:52:47.471744 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:48.472458 kubelet[1437]: E0913 00:52:48.472411 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:49.473633 kubelet[1437]: E0913 00:52:49.473557 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:50.474761 kubelet[1437]: E0913 00:52:50.474711 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:51.475767 kubelet[1437]: E0913 00:52:51.475708 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:51.636496 env[1189]: time="2025-09-13T00:52:51.636435012Z" level=info msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.718 [INFO][2294] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.719 [INFO][2294] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" iface="eth0" netns="/var/run/netns/cni-f2827f30-b5a4-5c93-a28c-c94d55cec44e" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.720 [INFO][2294] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" iface="eth0" netns="/var/run/netns/cni-f2827f30-b5a4-5c93-a28c-c94d55cec44e" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.723 [INFO][2294] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" iface="eth0" netns="/var/run/netns/cni-f2827f30-b5a4-5c93-a28c-c94d55cec44e" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.724 [INFO][2294] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.724 [INFO][2294] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.776 [INFO][2301] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.776 [INFO][2301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.776 [INFO][2301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.787 [WARNING][2301] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.787 [INFO][2301] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.789 [INFO][2301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:51.793544 env[1189]: 2025-09-13 00:52:51.791 [INFO][2294] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:52:51.797315 env[1189]: time="2025-09-13T00:52:51.796869297Z" level=info msg="TearDown network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" successfully" Sep 13 00:52:51.797315 env[1189]: time="2025-09-13T00:52:51.796913792Z" level=info msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" returns successfully" Sep 13 00:52:51.795629 systemd[1]: run-netns-cni\x2df2827f30\x2db5a4\x2d5c93\x2da28c\x2dc94d55cec44e.mount: Deactivated successfully. Sep 13 00:52:51.797941 env[1189]: time="2025-09-13T00:52:51.797893787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kx9d4,Uid:51a013dc-6244-4047-ae4c-28cabcf3140a,Namespace:calico-system,Attempt:1,}" Sep 13 00:52:51.944268 systemd-networkd[1005]: cali29de39b9298: Link UP Sep 13 00:52:51.947077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:52:51.947230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29de39b9298: link becomes ready Sep 13 00:52:51.947244 systemd-networkd[1005]: cali29de39b9298: Gained carrier Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.851 [INFO][2307] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.141.251-k8s-csi--node--driver--kx9d4-eth0 csi-node-driver- calico-system 51a013dc-6244-4047-ae4c-28cabcf3140a 1229 0 2025-09-13 00:52:23 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6c96d95cc7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 146.190.141.251 csi-node-driver-kx9d4 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali29de39b9298 [] [] }} ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.851 [INFO][2307] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.884 [INFO][2320] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" HandleID="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.884 [INFO][2320] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" HandleID="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c56c0), Attrs:map[string]string{"namespace":"calico-system", "node":"146.190.141.251", "pod":"csi-node-driver-kx9d4", "timestamp":"2025-09-13 00:52:51.88436115 +0000 UTC"}, Hostname:"146.190.141.251", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.884 [INFO][2320] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.884 [INFO][2320] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.884 [INFO][2320] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.141.251' Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.895 [INFO][2320] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.904 [INFO][2320] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.911 [INFO][2320] ipam/ipam.go 511: Trying affinity for 192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.913 [INFO][2320] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.916 [INFO][2320] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.916 [INFO][2320] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.192/26 handle="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.918 [INFO][2320] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577 Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.925 [INFO][2320] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.192/26 handle="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.936 [INFO][2320] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.193/26] block=192.168.53.192/26 handle="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.936 [INFO][2320] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.193/26] handle="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" host="146.190.141.251" Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.936 [INFO][2320] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:51.964677 env[1189]: 2025-09-13 00:52:51.936 [INFO][2320] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.193/26] IPv6=[] ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" HandleID="k8s-pod-network.b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.938 [INFO][2307] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-csi--node--driver--kx9d4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51a013dc-6244-4047-ae4c-28cabcf3140a", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"", Pod:"csi-node-driver-kx9d4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29de39b9298", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.938 [INFO][2307] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.193/32] ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.938 [INFO][2307] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali29de39b9298 ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.948 [INFO][2307] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.949 [INFO][2307] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-csi--node--driver--kx9d4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51a013dc-6244-4047-ae4c-28cabcf3140a", ResourceVersion:"1229", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577", Pod:"csi-node-driver-kx9d4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29de39b9298", MAC:"06:f2:25:c6:3c:ba", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:51.965633 env[1189]: 2025-09-13 00:52:51.963 [INFO][2307] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577" Namespace="calico-system" Pod="csi-node-driver-kx9d4" WorkloadEndpoint="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:52:51.976665 env[1189]: time="2025-09-13T00:52:51.976595364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:51.976879 env[1189]: time="2025-09-13T00:52:51.976853223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:51.976981 env[1189]: time="2025-09-13T00:52:51.976959587Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:51.977217 env[1189]: time="2025-09-13T00:52:51.977177429Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577 pid=2342 runtime=io.containerd.runc.v2 Sep 13 00:52:52.005514 systemd[1]: Started cri-containerd-b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577.scope. Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.023069 kernel: kauditd_printk_skb: 590 callbacks suppressed Sep 13 00:52:52.023218 kernel: audit: type=1400 audit(1757724772.020:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.028384 kernel: audit: type=1400 audit(1757724772.020:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.033132 kernel: audit: type=1400 audit(1757724772.020:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.033226 kernel: audit: type=1400 audit(1757724772.020:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.040473 kernel: audit: type=1400 audit(1757724772.020:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.045173 kernel: audit: type=1400 audit(1757724772.020:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.045273 kernel: audit: type=1400 audit(1757724772.020:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.052419 kernel: audit: type=1400 audit(1757724772.020:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.056323 kernel: audit: type=1400 audit(1757724772.020:655): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit: BPF prog-id=97 op=LOAD Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2342 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230646338656635363135303665383536396162343236363866376633 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2342 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.060362 kernel: audit: type=1400 audit(1757724772.020:656): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230646338656635363135303665383536396162343236363866376633 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.020000 audit: BPF prog-id=98 op=LOAD Sep 13 00:52:52.020000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000249b50 items=0 ppid=2342 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230646338656635363135303665383536396162343236363866376633 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit: BPF prog-id=99 op=LOAD Sep 13 00:52:52.024000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000249b98 items=0 ppid=2342 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230646338656635363135303665383536396162343236363866376633 Sep 13 00:52:52.024000 audit: BPF prog-id=99 op=UNLOAD Sep 13 00:52:52.024000 audit: BPF prog-id=98 op=UNLOAD Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { perfmon } for pid=2357 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit[2357]: AVC avc: denied { bpf } for pid=2357 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.024000 audit: BPF prog-id=100 op=LOAD Sep 13 00:52:52.024000 audit[2357]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000249fa8 items=0 ppid=2342 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230646338656635363135303665383536396162343236363866376633 Sep 13 00:52:51.992000 audit[2353]: NETFILTER_CFG table=filter:71 family=2 entries=38 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:51.992000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=21364 a0=3 a1=7ffe5cee0790 a2=0 a3=7ffe5cee077c items=0 ppid=2065 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:51.992000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:52.068832 env[1189]: time="2025-09-13T00:52:52.068777261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kx9d4,Uid:51a013dc-6244-4047-ae4c-28cabcf3140a,Namespace:calico-system,Attempt:1,} returns sandbox id \"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577\"" Sep 13 00:52:52.071195 env[1189]: time="2025-09-13T00:52:52.071150130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\"" Sep 13 00:52:52.476747 kubelet[1437]: E0913 00:52:52.476567 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:52.633948 env[1189]: time="2025-09-13T00:52:52.633884583Z" level=info msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.694 [INFO][2397] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.694 [INFO][2397] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" iface="eth0" netns="/var/run/netns/cni-b548c252-e2d3-5736-ebb3-c655d4cf5ccf" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.694 [INFO][2397] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" iface="eth0" netns="/var/run/netns/cni-b548c252-e2d3-5736-ebb3-c655d4cf5ccf" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.695 [INFO][2397] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" iface="eth0" netns="/var/run/netns/cni-b548c252-e2d3-5736-ebb3-c655d4cf5ccf" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.695 [INFO][2397] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.695 [INFO][2397] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.718 [INFO][2404] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.718 [INFO][2404] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.718 [INFO][2404] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.728 [WARNING][2404] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.728 [INFO][2404] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.731 [INFO][2404] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:52.734326 env[1189]: 2025-09-13 00:52:52.732 [INFO][2397] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:52:52.734326 env[1189]: time="2025-09-13T00:52:52.734064550Z" level=info msg="TearDown network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" successfully" Sep 13 00:52:52.734326 env[1189]: time="2025-09-13T00:52:52.734116183Z" level=info msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" returns successfully" Sep 13 00:52:52.735418 env[1189]: time="2025-09-13T00:52:52.735384678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-shj29,Uid:0b419cbd-cc2b-4fcb-b303-68389502eea2,Namespace:default,Attempt:1,}" Sep 13 00:52:52.796941 systemd[1]: run-containerd-runc-k8s.io-b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577-runc.7HPaZ7.mount: Deactivated successfully. Sep 13 00:52:52.797046 systemd[1]: run-netns-cni\x2db548c252\x2de2d3\x2d5736\x2debb3\x2dc655d4cf5ccf.mount: Deactivated successfully. Sep 13 00:52:52.900629 systemd-networkd[1005]: calicc52b560e33: Link UP Sep 13 00:52:52.903074 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicc52b560e33: link becomes ready Sep 13 00:52:52.902392 systemd-networkd[1005]: calicc52b560e33: Gained carrier Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.788 [INFO][2411] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0 nginx-deployment-7fcdb87857- default 0b419cbd-cc2b-4fcb-b303-68389502eea2 1238 0 2025-09-13 00:52:37 +0000 UTC map[app:nginx pod-template-hash:7fcdb87857 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.141.251 nginx-deployment-7fcdb87857-shj29 eth0 default [] [] [kns.default ksa.default.default] calicc52b560e33 [] [] }} ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.788 [INFO][2411] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.824 [INFO][2425] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" HandleID="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.825 [INFO][2425] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" HandleID="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4ff0), Attrs:map[string]string{"namespace":"default", "node":"146.190.141.251", "pod":"nginx-deployment-7fcdb87857-shj29", "timestamp":"2025-09-13 00:52:52.824783098 +0000 UTC"}, Hostname:"146.190.141.251", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.825 [INFO][2425] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.825 [INFO][2425] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.825 [INFO][2425] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.141.251' Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.835 [INFO][2425] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.843 [INFO][2425] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.849 [INFO][2425] ipam/ipam.go 511: Trying affinity for 192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.852 [INFO][2425] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.870 [INFO][2425] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.870 [INFO][2425] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.192/26 handle="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.874 [INFO][2425] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.880 [INFO][2425] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.192/26 handle="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.887 [INFO][2425] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.194/26] block=192.168.53.192/26 handle="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.887 [INFO][2425] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.194/26] handle="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" host="146.190.141.251" Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.887 [INFO][2425] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:52:52.916665 env[1189]: 2025-09-13 00:52:52.887 [INFO][2425] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.194/26] IPv6=[] ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" HandleID="k8s-pod-network.ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.889 [INFO][2411] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0b419cbd-cc2b-4fcb-b303-68389502eea2", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"", Pod:"nginx-deployment-7fcdb87857-shj29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicc52b560e33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.889 [INFO][2411] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.194/32] ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.889 [INFO][2411] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicc52b560e33 ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.902 [INFO][2411] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.902 [INFO][2411] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0b419cbd-cc2b-4fcb-b303-68389502eea2", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b", Pod:"nginx-deployment-7fcdb87857-shj29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicc52b560e33", MAC:"32:07:d0:cc:a5:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:52:52.917619 env[1189]: 2025-09-13 00:52:52.915 [INFO][2411] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b" Namespace="default" Pod="nginx-deployment-7fcdb87857-shj29" WorkloadEndpoint="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:52:52.930000 audit[2439]: NETFILTER_CFG table=filter:72 family=2 entries=42 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:52:52.930000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=22512 a0=3 a1=7ffeb821de20 a2=0 a3=7ffeb821de0c items=0 ppid=2065 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.930000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:52:52.935254 env[1189]: time="2025-09-13T00:52:52.935184971Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:52:52.935254 env[1189]: time="2025-09-13T00:52:52.935223461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:52:52.935469 env[1189]: time="2025-09-13T00:52:52.935234365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:52:52.935922 env[1189]: time="2025-09-13T00:52:52.935841677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b pid=2446 runtime=io.containerd.runc.v2 Sep 13 00:52:52.956210 systemd[1]: run-containerd-runc-k8s.io-ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b-runc.K5nu5i.mount: Deactivated successfully. Sep 13 00:52:52.961917 systemd[1]: Started cri-containerd-ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b.scope. Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.976000 audit: BPF prog-id=101 op=LOAD Sep 13 00:52:52.977000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.977000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2446 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363038323431636663663034366637376235643665333366626536 Sep 13 00:52:52.977000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.977000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2446 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363038323431636663663034366637376235643665333366626536 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit: BPF prog-id=102 op=LOAD Sep 13 00:52:52.978000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e6a00 items=0 ppid=2446 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363038323431636663663034366637376235643665333366626536 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.978000 audit: BPF prog-id=103 op=LOAD Sep 13 00:52:52.978000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e6a48 items=0 ppid=2446 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363038323431636663663034366637376235643665333366626536 Sep 13 00:52:52.979000 audit: BPF prog-id=103 op=UNLOAD Sep 13 00:52:52.979000 audit: BPF prog-id=102 op=UNLOAD Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { perfmon } for pid=2458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:52.979000 audit: BPF prog-id=104 op=LOAD Sep 13 00:52:52.979000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6e58 items=0 ppid=2446 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:52.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363038323431636663663034366637376235643665333366626536 Sep 13 00:52:53.012422 env[1189]: time="2025-09-13T00:52:53.009415292Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-7fcdb87857-shj29,Uid:0b419cbd-cc2b-4fcb-b303-68389502eea2,Namespace:default,Attempt:1,} returns sandbox id \"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b\"" Sep 13 00:52:53.458874 env[1189]: time="2025-09-13T00:52:53.458813059Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.460638 env[1189]: time="2025-09-13T00:52:53.460584728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.463126 env[1189]: time="2025-09-13T00:52:53.463069516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.465506 env[1189]: time="2025-09-13T00:52:53.465447227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:f22c88018d8b58c4ef0052f594b216a13bd6852166ac131a538c5ab2fba23bb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:53.468878 env[1189]: time="2025-09-13T00:52:53.468821002Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.3\" returns image reference \"sha256:666f4e02e75c30547109a06ed75b415a990a970811173aa741379cfaac4d9dd7\"" Sep 13 00:52:53.472363 env[1189]: time="2025-09-13T00:52:53.472142474Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:52:53.474839 env[1189]: time="2025-09-13T00:52:53.474793401Z" level=info msg="CreateContainer within sandbox \"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Sep 13 00:52:53.476708 kubelet[1437]: E0913 00:52:53.476660 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:53.490952 env[1189]: time="2025-09-13T00:52:53.490846272Z" level=info msg="CreateContainer within sandbox \"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"344cb89d42f0b872612df65def409d4ffa75a96a6f4abc72952e1092a0571da2\"" Sep 13 00:52:53.492188 env[1189]: time="2025-09-13T00:52:53.492151288Z" level=info msg="StartContainer for \"344cb89d42f0b872612df65def409d4ffa75a96a6f4abc72952e1092a0571da2\"" Sep 13 00:52:53.512348 systemd[1]: Started cri-containerd-344cb89d42f0b872612df65def409d4ffa75a96a6f4abc72952e1092a0571da2.scope. Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f6018d176a8 items=0 ppid=2342 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334346362383964343266306238373236313264663635646566343039 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.533000 audit: BPF prog-id=105 op=LOAD Sep 13 00:52:53.533000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000331bd8 items=0 ppid=2342 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334346362383964343266306238373236313264663635646566343039 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit: BPF prog-id=106 op=LOAD Sep 13 00:52:53.534000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000331c28 items=0 ppid=2342 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334346362383964343266306238373236313264663635646566343039 Sep 13 00:52:53.534000 audit: BPF prog-id=106 op=UNLOAD Sep 13 00:52:53.534000 audit: BPF prog-id=105 op=UNLOAD Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:53.534000 audit: BPF prog-id=107 op=LOAD Sep 13 00:52:53.534000 audit[2490]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000331cb8 items=0 ppid=2342 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:53.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334346362383964343266306238373236313264663635646566343039 Sep 13 00:52:53.554254 env[1189]: time="2025-09-13T00:52:53.554200975Z" level=info msg="StartContainer for \"344cb89d42f0b872612df65def409d4ffa75a96a6f4abc72952e1092a0571da2\" returns successfully" Sep 13 00:52:53.652185 systemd-networkd[1005]: cali29de39b9298: Gained IPv6LL Sep 13 00:52:54.355578 systemd-networkd[1005]: calicc52b560e33: Gained IPv6LL Sep 13 00:52:54.477734 kubelet[1437]: E0913 00:52:54.477661 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:55.478790 kubelet[1437]: E0913 00:52:55.478687 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:56.044533 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2218856076.mount: Deactivated successfully. Sep 13 00:52:56.479852 kubelet[1437]: E0913 00:52:56.479693 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:57.480315 kubelet[1437]: E0913 00:52:57.480250 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:57.632078 env[1189]: time="2025-09-13T00:52:57.632013940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.634887 env[1189]: time="2025-09-13T00:52:57.634845913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.636275 env[1189]: time="2025-09-13T00:52:57.636240887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.637746 env[1189]: time="2025-09-13T00:52:57.637714801Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:57.638665 env[1189]: time="2025-09-13T00:52:57.638632782Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:52:57.640812 env[1189]: time="2025-09-13T00:52:57.640786847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\"" Sep 13 00:52:57.641391 env[1189]: time="2025-09-13T00:52:57.641287331Z" level=info msg="CreateContainer within sandbox \"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Sep 13 00:52:57.650887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1817113999.mount: Deactivated successfully. Sep 13 00:52:57.657086 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3900834002.mount: Deactivated successfully. Sep 13 00:52:57.660460 env[1189]: time="2025-09-13T00:52:57.660254094Z" level=info msg="CreateContainer within sandbox \"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"542944cf13b5f9cce0e3a99368326d45343f91c059201a9e3317a2803481234b\"" Sep 13 00:52:57.661170 env[1189]: time="2025-09-13T00:52:57.661136677Z" level=info msg="StartContainer for \"542944cf13b5f9cce0e3a99368326d45343f91c059201a9e3317a2803481234b\"" Sep 13 00:52:57.683036 systemd[1]: Started cri-containerd-542944cf13b5f9cce0e3a99368326d45343f91c059201a9e3317a2803481234b.scope. Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.705819 kernel: kauditd_printk_skb: 153 callbacks suppressed Sep 13 00:52:57.705905 kernel: audit: type=1400 audit(1757724777.703:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.709730 kernel: audit: type=1400 audit(1757724777.703:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.709793 kernel: audit: type=1400 audit(1757724777.703:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.713783 kernel: audit: type=1400 audit(1757724777.703:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.713851 kernel: audit: type=1400 audit(1757724777.703:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.721090 kernel: audit: type=1400 audit(1757724777.703:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.721530 kernel: audit: type=1400 audit(1757724777.703:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.721596 kernel: audit: type=1400 audit(1757724777.703:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.725585 kernel: audit: type=1400 audit(1757724777.703:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.725833 kernel: audit: type=1400 audit(1757724777.703:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.703000 audit: BPF prog-id=108 op=LOAD Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2446 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323934346366313362356639636365306533613939333638333236 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2446 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323934346366313362356639636365306533613939333638333236 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.704000 audit: BPF prog-id=109 op=LOAD Sep 13 00:52:57.704000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e60d0 items=0 ppid=2446 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323934346366313362356639636365306533613939333638333236 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.706000 audit: BPF prog-id=110 op=LOAD Sep 13 00:52:57.706000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e6118 items=0 ppid=2446 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323934346366313362356639636365306533613939333638333236 Sep 13 00:52:57.710000 audit: BPF prog-id=110 op=UNLOAD Sep 13 00:52:57.710000 audit: BPF prog-id=109 op=UNLOAD Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:57.710000 audit: BPF prog-id=111 op=LOAD Sep 13 00:52:57.710000 audit[2525]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6528 items=0 ppid=2446 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:57.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534323934346366313362356639636365306533613939333638333236 Sep 13 00:52:57.749915 env[1189]: time="2025-09-13T00:52:57.749129086Z" level=info msg="StartContainer for \"542944cf13b5f9cce0e3a99368326d45343f91c059201a9e3317a2803481234b\" returns successfully" Sep 13 00:52:58.481380 kubelet[1437]: E0913 00:52:58.481269 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:59.300138 env[1189]: time="2025-09-13T00:52:59.300076979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.301425 env[1189]: time="2025-09-13T00:52:59.301379717Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.303546 env[1189]: time="2025-09-13T00:52:59.303510760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.305134 env[1189]: time="2025-09-13T00:52:59.305106165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:731ab232ca708102ab332340b1274d5cd656aa896ecc5368ee95850b811df86f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:52:59.305742 env[1189]: time="2025-09-13T00:52:59.305455512Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.3\" returns image reference \"sha256:b8f31c4fdaed3fa08af64de3d37d65a4c2ea0d9f6f522cb60d2e0cb424f8dd8a\"" Sep 13 00:52:59.307969 env[1189]: time="2025-09-13T00:52:59.307942456Z" level=info msg="CreateContainer within sandbox \"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Sep 13 00:52:59.319172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3908071689.mount: Deactivated successfully. Sep 13 00:52:59.322486 env[1189]: time="2025-09-13T00:52:59.322443642Z" level=info msg="CreateContainer within sandbox \"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"909990c658ad6fa63d9d502bc7e2b562a5fec0c76adfeff2b9a8aebbd8140745\"" Sep 13 00:52:59.323636 env[1189]: time="2025-09-13T00:52:59.323601212Z" level=info msg="StartContainer for \"909990c658ad6fa63d9d502bc7e2b562a5fec0c76adfeff2b9a8aebbd8140745\"" Sep 13 00:52:59.351529 systemd[1]: Started cri-containerd-909990c658ad6fa63d9d502bc7e2b562a5fec0c76adfeff2b9a8aebbd8140745.scope. Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f714ffb7b78 items=0 ppid=2342 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393939306336353861643666613633643964353032626337653262 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.377000 audit: BPF prog-id=112 op=LOAD Sep 13 00:52:59.377000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d63a8 items=0 ppid=2342 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393939306336353861643666613633643964353032626337653262 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.378000 audit: BPF prog-id=113 op=LOAD Sep 13 00:52:59.378000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d63f8 items=0 ppid=2342 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393939306336353861643666613633643964353032626337653262 Sep 13 00:52:59.379000 audit: BPF prog-id=113 op=UNLOAD Sep 13 00:52:59.379000 audit: BPF prog-id=112 op=UNLOAD Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:52:59.379000 audit: BPF prog-id=114 op=LOAD Sep 13 00:52:59.379000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d6488 items=0 ppid=2342 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:52:59.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393939306336353861643666613633643964353032626337653262 Sep 13 00:52:59.399372 env[1189]: time="2025-09-13T00:52:59.399288062Z" level=info msg="StartContainer for \"909990c658ad6fa63d9d502bc7e2b562a5fec0c76adfeff2b9a8aebbd8140745\" returns successfully" Sep 13 00:52:59.481619 kubelet[1437]: E0913 00:52:59.481542 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:52:59.545977 kubelet[1437]: I0913 00:52:59.545939 1437 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Sep 13 00:52:59.545977 kubelet[1437]: I0913 00:52:59.545973 1437 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Sep 13 00:52:59.761063 kubelet[1437]: I0913 00:52:59.760916 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kx9d4" podStartSLOduration=29.524808728 podStartE2EDuration="36.760890516s" podCreationTimestamp="2025-09-13 00:52:23 +0000 UTC" firstStartedPulling="2025-09-13 00:52:52.070662563 +0000 UTC m=+29.045241742" lastFinishedPulling="2025-09-13 00:52:59.30674435 +0000 UTC m=+36.281323530" observedRunningTime="2025-09-13 00:52:59.75988541 +0000 UTC m=+36.734464607" watchObservedRunningTime="2025-09-13 00:52:59.760890516 +0000 UTC m=+36.735469715" Sep 13 00:52:59.762647 kubelet[1437]: I0913 00:52:59.761043 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-7fcdb87857-shj29" podStartSLOduration=18.132114574 podStartE2EDuration="22.761038306s" podCreationTimestamp="2025-09-13 00:52:37 +0000 UTC" firstStartedPulling="2025-09-13 00:52:53.011124445 +0000 UTC m=+29.985703636" lastFinishedPulling="2025-09-13 00:52:57.64004819 +0000 UTC m=+34.614627368" observedRunningTime="2025-09-13 00:52:58.759321238 +0000 UTC m=+35.733900438" watchObservedRunningTime="2025-09-13 00:52:59.761038306 +0000 UTC m=+36.735617505" Sep 13 00:53:00.482541 kubelet[1437]: E0913 00:53:00.482480 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:01.029000 audit[2615]: NETFILTER_CFG table=filter:73 family=2 entries=11 op=nft_register_rule pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.029000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffcd13ab2d0 a2=0 a3=7ffcd13ab2bc items=0 ppid=1653 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.036000 audit[2615]: NETFILTER_CFG table=nat:74 family=2 entries=29 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.036000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=10116 a0=3 a1=7ffcd13ab2d0 a2=0 a3=7ffcd13ab2bc items=0 ppid=1653 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.194000 audit[2617]: NETFILTER_CFG table=filter:75 family=2 entries=22 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.194000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffcbb13cee0 a2=0 a3=7ffcbb13cecc items=0 ppid=1653 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.198000 audit[2617]: NETFILTER_CFG table=nat:76 family=2 entries=24 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:01.198000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=7308 a0=3 a1=7ffcbb13cee0 a2=0 a3=0 items=0 ppid=1653 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:01.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:01.445017 systemd[1]: Created slice kubepods-besteffort-podc7249ccd_6cfa_4504_badc_0bb15b939e96.slice. Sep 13 00:53:01.483123 kubelet[1437]: E0913 00:53:01.483062 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:01.538775 kubelet[1437]: I0913 00:53:01.538715 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/c7249ccd-6cfa-4504-badc-0bb15b939e96-data\") pod \"nfs-server-provisioner-0\" (UID: \"c7249ccd-6cfa-4504-badc-0bb15b939e96\") " pod="default/nfs-server-provisioner-0" Sep 13 00:53:01.539038 kubelet[1437]: I0913 00:53:01.539018 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xf7tz\" (UniqueName: \"kubernetes.io/projected/c7249ccd-6cfa-4504-badc-0bb15b939e96-kube-api-access-xf7tz\") pod \"nfs-server-provisioner-0\" (UID: \"c7249ccd-6cfa-4504-badc-0bb15b939e96\") " pod="default/nfs-server-provisioner-0" Sep 13 00:53:01.749900 env[1189]: time="2025-09-13T00:53:01.749239836Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c7249ccd-6cfa-4504-badc-0bb15b939e96,Namespace:default,Attempt:0,}" Sep 13 00:53:01.840407 update_engine[1178]: I0913 00:53:01.840345 1178 update_attempter.cc:509] Updating boot flags... Sep 13 00:53:01.958842 systemd-networkd[1005]: cali60e51b789ff: Link UP Sep 13 00:53:01.960539 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:01.960929 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Sep 13 00:53:01.961090 systemd-networkd[1005]: cali60e51b789ff: Gained carrier Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.810 [INFO][2619] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.141.251-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default c7249ccd-6cfa-4504-badc-0bb15b939e96 1308 0 2025-09-13 00:53:01 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 146.190.141.251 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] [] }} ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.811 [INFO][2619] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.854 [INFO][2632] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" HandleID="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Workload="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.855 [INFO][2632] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" HandleID="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Workload="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56c0), Attrs:map[string]string{"namespace":"default", "node":"146.190.141.251", "pod":"nfs-server-provisioner-0", "timestamp":"2025-09-13 00:53:01.85487646 +0000 UTC"}, Hostname:"146.190.141.251", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.855 [INFO][2632] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.855 [INFO][2632] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.855 [INFO][2632] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.141.251' Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.879 [INFO][2632] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.892 [INFO][2632] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.904 [INFO][2632] ipam/ipam.go 511: Trying affinity for 192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.910 [INFO][2632] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.920 [INFO][2632] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.922 [INFO][2632] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.192/26 handle="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.925 [INFO][2632] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5 Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.935 [INFO][2632] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.192/26 handle="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.945 [INFO][2632] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.195/26] block=192.168.53.192/26 handle="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.945 [INFO][2632] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.195/26] handle="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" host="146.190.141.251" Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.945 [INFO][2632] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:01.979007 env[1189]: 2025-09-13 00:53:01.945 [INFO][2632] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.195/26] IPv6=[] ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" HandleID="k8s-pod-network.5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Workload="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.980650 env[1189]: 2025-09-13 00:53:01.951 [INFO][2619] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c7249ccd-6cfa-4504-badc-0bb15b939e96", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:01.980650 env[1189]: 2025-09-13 00:53:01.953 [INFO][2619] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.195/32] ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.980650 env[1189]: 2025-09-13 00:53:01.953 [INFO][2619] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.980650 env[1189]: 2025-09-13 00:53:01.961 [INFO][2619] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:01.980869 env[1189]: 2025-09-13 00:53:01.961 [INFO][2619] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"c7249ccd-6cfa-4504-badc-0bb15b939e96", ResourceVersion:"1308", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.53.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"12:5d:f8:79:ca:c1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:01.980869 env[1189]: 2025-09-13 00:53:01.977 [INFO][2619] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="146.190.141.251-k8s-nfs--server--provisioner--0-eth0" Sep 13 00:53:02.011890 env[1189]: time="2025-09-13T00:53:02.010270622Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:02.011890 env[1189]: time="2025-09-13T00:53:02.010336415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:02.011890 env[1189]: time="2025-09-13T00:53:02.010348463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:02.012465 env[1189]: time="2025-09-13T00:53:02.012399032Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5 pid=2665 runtime=io.containerd.runc.v2 Sep 13 00:53:02.030380 systemd[1]: Started cri-containerd-5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5.scope. Sep 13 00:53:02.034000 audit[2690]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:02.034000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=20756 a0=3 a1=7ffd97f67d80 a2=0 a3=7ffd97f67d6c items=0 ppid=2065 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.034000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit: BPF prog-id=115 op=LOAD Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566336230303730353039313065363232333064656537323763346339 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566336230303730353039313065363232333064656537323763346339 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit: BPF prog-id=116 op=LOAD Sep 13 00:53:02.054000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e9be0 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566336230303730353039313065363232333064656537323763346339 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit: BPF prog-id=117 op=LOAD Sep 13 00:53:02.054000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e9c28 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566336230303730353039313065363232333064656537323763346339 Sep 13 00:53:02.054000 audit: BPF prog-id=117 op=UNLOAD Sep 13 00:53:02.054000 audit: BPF prog-id=116 op=UNLOAD Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:02.054000 audit: BPF prog-id=118 op=LOAD Sep 13 00:53:02.054000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000356038 items=0 ppid=2665 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566336230303730353039313065363232333064656537323763346339 Sep 13 00:53:02.072000 audit[2699]: NETFILTER_CFG table=filter:78 family=2 entries=34 op=nft_register_rule pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:02.072000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=12688 a0=3 a1=7ffef1c08240 a2=0 a3=7ffef1c0822c items=0 ppid=1653 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:02.077000 audit[2699]: NETFILTER_CFG table=nat:79 family=2 entries=36 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:02.077000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=12004 a0=3 a1=7ffef1c08240 a2=0 a3=7ffef1c0822c items=0 ppid=1653 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:02.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:02.098660 env[1189]: time="2025-09-13T00:53:02.098610783Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:c7249ccd-6cfa-4504-badc-0bb15b939e96,Namespace:default,Attempt:0,} returns sandbox id \"5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5\"" Sep 13 00:53:02.100707 env[1189]: time="2025-09-13T00:53:02.100632738Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Sep 13 00:53:02.483483 kubelet[1437]: E0913 00:53:02.483405 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:03.315537 systemd-networkd[1005]: cali60e51b789ff: Gained IPv6LL Sep 13 00:53:03.450765 kubelet[1437]: E0913 00:53:03.450708 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:03.484468 kubelet[1437]: E0913 00:53:03.484404 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:04.451467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3047523039.mount: Deactivated successfully. Sep 13 00:53:04.485060 kubelet[1437]: E0913 00:53:04.484987 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:05.485605 kubelet[1437]: E0913 00:53:05.485542 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:06.511451 kubelet[1437]: E0913 00:53:06.511389 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:06.591198 env[1189]: time="2025-09-13T00:53:06.591141546Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:06.593533 env[1189]: time="2025-09-13T00:53:06.593489704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:06.595244 env[1189]: time="2025-09-13T00:53:06.595204482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:06.596978 env[1189]: time="2025-09-13T00:53:06.596931830Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:06.597845 env[1189]: time="2025-09-13T00:53:06.597796012Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Sep 13 00:53:06.616827 env[1189]: time="2025-09-13T00:53:06.616773874Z" level=info msg="CreateContainer within sandbox \"5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Sep 13 00:53:06.628376 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3967895599.mount: Deactivated successfully. Sep 13 00:53:06.636112 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2034479624.mount: Deactivated successfully. Sep 13 00:53:06.639988 env[1189]: time="2025-09-13T00:53:06.639920769Z" level=info msg="CreateContainer within sandbox \"5f3b007050910e62230dee727c4c90aa75b7620f8863f2e80ea5e3e7896ff5f5\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"16d43945cb8eada92a43ae65d84c49869deade5d5173298c21d4278305599f91\"" Sep 13 00:53:06.640852 env[1189]: time="2025-09-13T00:53:06.640811379Z" level=info msg="StartContainer for \"16d43945cb8eada92a43ae65d84c49869deade5d5173298c21d4278305599f91\"" Sep 13 00:53:06.662826 systemd[1]: Started cri-containerd-16d43945cb8eada92a43ae65d84c49869deade5d5173298c21d4278305599f91.scope. Sep 13 00:53:06.691195 kernel: kauditd_printk_skb: 168 callbacks suppressed Sep 13 00:53:06.691398 kernel: audit: type=1400 audit(1757724786.683:740): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691434 kernel: audit: type=1400 audit(1757724786.683:741): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691452 kernel: audit: type=1400 audit(1757724786.683:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.697028 kernel: audit: type=1400 audit(1757724786.683:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.697203 kernel: audit: type=1400 audit(1757724786.683:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.702202 kernel: audit: type=1400 audit(1757724786.683:745): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.702399 kernel: audit: type=1400 audit(1757724786.683:746): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.702452 kernel: audit: type=1400 audit(1757724786.683:747): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.704599 kernel: audit: type=1400 audit(1757724786.683:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.708741 kernel: audit: type=1400 audit(1757724786.683:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.683000 audit: BPF prog-id=119 op=LOAD Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2665 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643433393435636238656164613932613433616536356438346334 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2665 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643433393435636238656164613932613433616536356438346334 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.691000 audit: BPF prog-id=120 op=LOAD Sep 13 00:53:06.691000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003dcf20 items=0 ppid=2665 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643433393435636238656164613932613433616536356438346334 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit: BPF prog-id=121 op=LOAD Sep 13 00:53:06.694000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003dcf68 items=0 ppid=2665 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643433393435636238656164613932613433616536356438346334 Sep 13 00:53:06.694000 audit: BPF prog-id=121 op=UNLOAD Sep 13 00:53:06.694000 audit: BPF prog-id=120 op=UNLOAD Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:06.694000 audit: BPF prog-id=122 op=LOAD Sep 13 00:53:06.694000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dd378 items=0 ppid=2665 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136643433393435636238656164613932613433616536356438346334 Sep 13 00:53:06.731567 env[1189]: time="2025-09-13T00:53:06.731518078Z" level=info msg="StartContainer for \"16d43945cb8eada92a43ae65d84c49869deade5d5173298c21d4278305599f91\" returns successfully" Sep 13 00:53:06.733000 audit[2747]: NETFILTER_CFG table=filter:80 family=2 entries=33 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:06.733000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffefc0ef310 a2=0 a3=7ffefc0ef2fc items=0 ppid=1653 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:06.737000 audit[2747]: NETFILTER_CFG table=nat:81 family=2 entries=31 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:06.737000 audit[2747]: SYSCALL arch=c000003e syscall=46 success=yes exit=10884 a0=3 a1=7ffefc0ef310 a2=0 a3=7ffefc0ef2fc items=0 ppid=1653 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:06.789000 audit[2749]: AVC avc: denied { search } for pid=2749 comm="rpcbind" name="crypto" dev="proc" ino=23352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:53:06.789000 audit[2749]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb387e7a0c0 a2=0 a3=0 items=0 ppid=2731 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 key=(null) Sep 13 00:53:06.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Sep 13 00:53:06.797182 kubelet[1437]: I0913 00:53:06.797082 1437 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.282911295 podStartE2EDuration="5.797060652s" podCreationTimestamp="2025-09-13 00:53:01 +0000 UTC" firstStartedPulling="2025-09-13 00:53:02.100246325 +0000 UTC m=+39.074825516" lastFinishedPulling="2025-09-13 00:53:06.614395668 +0000 UTC m=+43.588974873" observedRunningTime="2025-09-13 00:53:06.796988516 +0000 UTC m=+43.771567714" watchObservedRunningTime="2025-09-13 00:53:06.797060652 +0000 UTC m=+43.771639842" Sep 13 00:53:06.827000 audit[2755]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:06.827000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc933e0a90 a2=0 a3=7ffc933e0a7c items=0 ppid=1653 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:06.834000 audit[2755]: NETFILTER_CFG table=nat:83 family=2 entries=110 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Sep 13 00:53:06.834000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=50988 a0=3 a1=7ffc933e0a90 a2=0 a3=7ffc933e0a7c items=0 ppid=1653 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:06.834000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Sep 13 00:53:06.835000 audit[2756]: AVC avc: denied { search } for pid=2756 comm="dbus-daemon" name="crypto" dev="proc" ino=23352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:53:06.835000 audit[2756]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4e5d32c0c0 a2=0 a3=0 items=0 ppid=2731 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 key=(null) Sep 13 00:53:06.835000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:53:06.839000 audit[2757]: AVC avc: denied { watch } for pid=2757 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537482 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c101,c278 tclass=dir permissive=0 Sep 13 00:53:06.839000 audit[2757]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=558e85122ca0 a2=2c8 a3=7fff8cb0257c items=0 ppid=2731 pid=2757 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 key=(null) Sep 13 00:53:06.839000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Sep 13 00:53:06.844000 audit[2758]: AVC avc: denied { read } for pid=2758 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23433 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Sep 13 00:53:06.844000 audit[2758]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fdc9e31b320 a1=80000 a2=d a3=7ffeedf27350 items=0 ppid=2731 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 key=(null) Sep 13 00:53:06.844000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:53:06.845000 audit[2758]: AVC avc: denied { search } for pid=2758 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23352 scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Sep 13 00:53:06.845000 audit[2758]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdc9d86f0c0 a2=0 a3=0 items=0 ppid=2731 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c101,c278 key=(null) Sep 13 00:53:06.845000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Sep 13 00:53:07.512505 kubelet[1437]: E0913 00:53:07.512445 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:08.512826 kubelet[1437]: E0913 00:53:08.512775 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:09.514185 kubelet[1437]: E0913 00:53:09.514117 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:10.515167 kubelet[1437]: E0913 00:53:10.515103 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:11.515351 kubelet[1437]: E0913 00:53:11.515276 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:12.517135 kubelet[1437]: E0913 00:53:12.517066 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:12.701631 systemd[1]: run-containerd-runc-k8s.io-6b9369ca279c33db2123adc2f7abc6d509379a3dcbf2c8071c30b2bc85e4458f-runc.LN7k1b.mount: Deactivated successfully. Sep 13 00:53:13.517323 kubelet[1437]: E0913 00:53:13.517252 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:14.518921 kubelet[1437]: E0913 00:53:14.518873 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:15.520252 kubelet[1437]: E0913 00:53:15.520189 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:16.520979 kubelet[1437]: E0913 00:53:16.520904 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:16.655876 systemd[1]: Created slice kubepods-besteffort-pod0c2af893_ece6_469f_9d27_b6f4cf8d4872.slice. Sep 13 00:53:16.752024 kubelet[1437]: I0913 00:53:16.751901 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xr6x2\" (UniqueName: \"kubernetes.io/projected/0c2af893-ece6-469f-9d27-b6f4cf8d4872-kube-api-access-xr6x2\") pod \"test-pod-1\" (UID: \"0c2af893-ece6-469f-9d27-b6f4cf8d4872\") " pod="default/test-pod-1" Sep 13 00:53:16.752024 kubelet[1437]: I0913 00:53:16.752031 1437 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a136caef-7bf1-4238-bb23-e94222a3a143\" (UniqueName: \"kubernetes.io/nfs/0c2af893-ece6-469f-9d27-b6f4cf8d4872-pvc-a136caef-7bf1-4238-bb23-e94222a3a143\") pod \"test-pod-1\" (UID: \"0c2af893-ece6-469f-9d27-b6f4cf8d4872\") " pod="default/test-pod-1" Sep 13 00:53:16.881937 kernel: Failed to create system directory netfs Sep 13 00:53:16.882112 kernel: kauditd_printk_skb: 74 callbacks suppressed Sep 13 00:53:16.882139 kernel: audit: type=1400 audit(1757724796.872:767): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.872000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.885183 kernel: Failed to create system directory netfs Sep 13 00:53:16.885319 kernel: audit: type=1400 audit(1757724796.872:767): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.872000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.888293 kernel: Failed to create system directory netfs Sep 13 00:53:16.888393 kernel: audit: type=1400 audit(1757724796.872:767): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.872000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.891397 kernel: Failed to create system directory netfs Sep 13 00:53:16.891485 kernel: audit: type=1400 audit(1757724796.872:767): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.872000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.872000 audit[2807]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56421fd8a5e0 a1=153bc a2=5642074f72b0 a3=5 items=0 ppid=57 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:16.900456 kernel: audit: type=1300 audit(1757724796.872:767): arch=c000003e syscall=175 success=yes exit=0 a0=56421fd8a5e0 a1=153bc a2=5642074f72b0 a3=5 items=0 ppid=57 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:16.872000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:53:16.902338 kernel: audit: type=1327 audit(1757724796.872:767): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:53:16.911472 kernel: Failed to create system directory fscache Sep 13 00:53:16.911627 kernel: audit: type=1400 audit(1757724796.903:768): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.911671 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.916433 kernel: audit: type=1400 audit(1757724796.903:768): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.916581 kernel: Failed to create system directory fscache Sep 13 00:53:16.916625 kernel: Failed to create system directory fscache Sep 13 00:53:16.916652 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.919323 kernel: Failed to create system directory fscache Sep 13 00:53:16.919425 kernel: Failed to create system directory fscache Sep 13 00:53:16.919449 kernel: Failed to create system directory fscache Sep 13 00:53:16.919468 kernel: Failed to create system directory fscache Sep 13 00:53:16.922968 kernel: Failed to create system directory fscache Sep 13 00:53:16.923077 kernel: audit: type=1400 audit(1757724796.903:768): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.923101 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.926182 kernel: audit: type=1400 audit(1757724796.903:768): avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.926276 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.927466 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.928326 kernel: Failed to create system directory fscache Sep 13 00:53:16.903000 audit[2807]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56421ff9f9c0 a1=4c0fc a2=5642074f72b0 a3=5 items=0 ppid=57 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:16.930326 kernel: FS-Cache: Loaded Sep 13 00:53:16.903000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.969805 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.969875 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.969911 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.969939 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.971383 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.971450 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.972708 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.972775 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.973319 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.974561 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.974600 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.975832 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.975865 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.977714 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.977768 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.977808 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.978846 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.978872 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.980620 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.980694 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.980729 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.981854 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.981897 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.983775 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.983832 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.983864 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.985568 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.985601 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.985628 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.986707 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.986743 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.987869 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.987913 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.989640 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.989677 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.989698 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.990810 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.990859 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.992551 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.992656 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.992680 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.993719 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.993769 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.994377 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.995621 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.995654 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.996863 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.996923 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.998738 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.998814 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.998866 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.000670 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.000739 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.000765 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.001863 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.001903 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.003851 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.003923 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.003967 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.004475 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.005714 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.005794 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.007033 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.007099 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.007540 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.008918 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.009008 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.010666 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.010726 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.012123 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.012178 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.013359 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.013401 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.014680 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.014758 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.017167 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.017240 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.017263 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.018024 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.018882 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.019373 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.020614 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.020660 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.021824 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.021908 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.022432 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.023646 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.023691 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.025077 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.025210 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.025355 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.026678 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.026848 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.027704 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.028665 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.028720 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.029900 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.029947 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.031908 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.032060 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.032089 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.034444 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.034524 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.034547 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.034765 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.035386 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.036579 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.036634 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.037784 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.037895 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.039252 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.039393 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.039854 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.041408 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.041500 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.042901 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.042981 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.043848 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.043900 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.044483 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.045682 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.045784 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.053314 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.053418 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.053722 kernel: Failed to create system directory sunrpc Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:16.952000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.055098 kernel: Failed to create system directory sunrpc Sep 13 00:53:17.066163 kernel: RPC: Registered named UNIX socket transport module. Sep 13 00:53:17.066326 kernel: RPC: Registered udp transport module. Sep 13 00:53:17.066380 kernel: RPC: Registered tcp transport module. Sep 13 00:53:17.066905 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 13 00:53:16.952000 audit[2807]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56421ffebad0 a1=1a8274 a2=5642074f72b0 a3=5 items=6 ppid=57 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:16.952000 audit: CWD cwd="/" Sep 13 00:53:16.952000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PATH item=1 name=(null) inode=22511 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PATH item=2 name=(null) inode=22511 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PATH item=3 name=(null) inode=22512 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PATH item=4 name=(null) inode=22511 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PATH item=5 name=(null) inode=22513 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Sep 13 00:53:16.952000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.112680 kernel: Failed to create system directory nfs Sep 13 00:53:17.112788 kernel: Failed to create system directory nfs Sep 13 00:53:17.112817 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.113804 kernel: Failed to create system directory nfs Sep 13 00:53:17.113889 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.115689 kernel: Failed to create system directory nfs Sep 13 00:53:17.115767 kernel: Failed to create system directory nfs Sep 13 00:53:17.115802 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.116744 kernel: Failed to create system directory nfs Sep 13 00:53:17.116810 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.117458 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.118538 kernel: Failed to create system directory nfs Sep 13 00:53:17.118609 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.119762 kernel: Failed to create system directory nfs Sep 13 00:53:17.119826 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.120410 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.121611 kernel: Failed to create system directory nfs Sep 13 00:53:17.121735 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.122668 kernel: Failed to create system directory nfs Sep 13 00:53:17.122728 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.123866 kernel: Failed to create system directory nfs Sep 13 00:53:17.123923 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.124372 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.125555 kernel: Failed to create system directory nfs Sep 13 00:53:17.125612 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.126738 kernel: Failed to create system directory nfs Sep 13 00:53:17.126818 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.127913 kernel: Failed to create system directory nfs Sep 13 00:53:17.127989 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.129619 kernel: Failed to create system directory nfs Sep 13 00:53:17.129690 kernel: Failed to create system directory nfs Sep 13 00:53:17.129717 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.130817 kernel: Failed to create system directory nfs Sep 13 00:53:17.130900 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.132649 kernel: Failed to create system directory nfs Sep 13 00:53:17.132735 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.139924 kernel: Failed to create system directory nfs Sep 13 00:53:17.140012 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.140739 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.141588 kernel: Failed to create system directory nfs Sep 13 00:53:17.141674 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.142894 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.143574 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.144860 kernel: Failed to create system directory nfs Sep 13 00:53:17.144908 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.145543 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.146816 kernel: Failed to create system directory nfs Sep 13 00:53:17.146848 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.147520 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.148747 kernel: Failed to create system directory nfs Sep 13 00:53:17.148805 kernel: Failed to create system directory nfs Sep 13 00:53:17.148828 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.150724 kernel: Failed to create system directory nfs Sep 13 00:53:17.150765 kernel: Failed to create system directory nfs Sep 13 00:53:17.150783 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.152491 kernel: Failed to create system directory nfs Sep 13 00:53:17.152522 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.153785 kernel: Failed to create system directory nfs Sep 13 00:53:17.153823 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: AVC avc: denied { confidentiality } for pid=2807 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.154477 kernel: Failed to create system directory nfs Sep 13 00:53:17.099000 audit[2807]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56422020cc10 a1=16eb2c a2=5642074f72b0 a3=5 items=0 ppid=57 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.178463 kernel: FS-Cache: Netfs 'nfs' registered for caching Sep 13 00:53:17.099000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.229805 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.229907 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.229933 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.231809 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.231872 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.231916 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.233520 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.233574 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.233592 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.234951 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.235004 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.236733 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.236803 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.236824 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.238552 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.238608 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.238630 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.239796 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.239848 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.241682 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.241728 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.241747 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.242814 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.242875 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.244627 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.244687 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.244707 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.245778 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.245821 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.247658 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.247711 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.247729 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.249521 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.249560 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.249594 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.250771 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.250817 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.252545 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.252599 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.252621 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.253773 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.253821 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.255510 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.255562 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.255582 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.256654 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.256702 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.257883 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.257917 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.259719 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.259766 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.259786 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.260341 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.261560 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.261620 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.262339 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.263959 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.264738 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.264806 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.266475 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.266544 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.267376 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.268993 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.269099 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.270347 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.270404 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.271495 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.271537 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.272664 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.272722 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.273828 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.273877 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.275682 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.275735 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.275755 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.276873 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.276947 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.278631 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.278673 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.278700 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.279749 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.279790 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.281630 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.281677 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.281702 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.282853 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.282892 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.284706 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.284760 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.284791 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.285857 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.285888 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.208000 audit[2812]: AVC avc: denied { confidentiality } for pid=2812 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.287752 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.287901 kernel: Failed to create system directory nfs4 Sep 13 00:53:17.435757 kernel: NFS: Registering the id_resolver key type Sep 13 00:53:17.435933 kernel: Key type id_resolver registered Sep 13 00:53:17.435956 kernel: Key type id_legacy registered Sep 13 00:53:17.208000 audit[2812]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f73a29af010 a1=2095c4 a2=55ee095712b0 a3=5 items=0 ppid=57 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.208000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.454517 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.455390 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.456820 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.456870 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.457615 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.457686 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.458915 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.458997 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.460768 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.460822 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.460841 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.462773 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.462818 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.462886 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.469894 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.469989 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.470635 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.471351 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.472716 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.472778 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.473852 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.473889 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.475792 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.475834 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.475886 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.476375 kernel: Failed to create system directory rpcgss Sep 13 00:53:17.448000 audit[2813]: AVC avc: denied { confidentiality } for pid=2813 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Sep 13 00:53:17.448000 audit[2813]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fae4faec010 a1=70bf4 a2=560ead4852b0 a3=5 items=0 ppid=57 pid=2813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:17.448000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Sep 13 00:53:17.521684 kubelet[1437]: E0913 00:53:17.521579 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:18.522424 kubelet[1437]: E0913 00:53:18.522368 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:19.522935 kubelet[1437]: E0913 00:53:19.522884 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:20.524389 kubelet[1437]: E0913 00:53:20.524339 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:21.525576 kubelet[1437]: E0913 00:53:21.525514 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:22.527028 kubelet[1437]: E0913 00:53:22.526968 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:23.450729 kubelet[1437]: E0913 00:53:23.450669 1437 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:23.477474 env[1189]: time="2025-09-13T00:53:23.477434775Z" level=info msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" Sep 13 00:53:23.528336 kubelet[1437]: E0913 00:53:23.528240 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.529 [WARNING][2841] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-csi--node--driver--kx9d4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51a013dc-6244-4047-ae4c-28cabcf3140a", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577", Pod:"csi-node-driver-kx9d4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29de39b9298", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.529 [INFO][2841] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.529 [INFO][2841] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" iface="eth0" netns="" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.529 [INFO][2841] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.529 [INFO][2841] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.560 [INFO][2848] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.560 [INFO][2848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.560 [INFO][2848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.568 [WARNING][2848] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.568 [INFO][2848] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.570 [INFO][2848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:23.573620 env[1189]: 2025-09-13 00:53:23.571 [INFO][2841] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.574353 env[1189]: time="2025-09-13T00:53:23.574294108Z" level=info msg="TearDown network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" successfully" Sep 13 00:53:23.574460 env[1189]: time="2025-09-13T00:53:23.574437575Z" level=info msg="StopPodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" returns successfully" Sep 13 00:53:23.575120 env[1189]: time="2025-09-13T00:53:23.575075059Z" level=info msg="RemovePodSandbox for \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" Sep 13 00:53:23.575225 env[1189]: time="2025-09-13T00:53:23.575116176Z" level=info msg="Forcibly stopping sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\"" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.623 [WARNING][2862] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-csi--node--driver--kx9d4-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"51a013dc-6244-4047-ae4c-28cabcf3140a", ResourceVersion:"1277", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6c96d95cc7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"b0dc8ef561506e8569ab42668f7f304390915b61db25613d92f5cffa75cfa577", Pod:"csi-node-driver-kx9d4", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.53.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29de39b9298", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.623 [INFO][2862] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.623 [INFO][2862] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" iface="eth0" netns="" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.623 [INFO][2862] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.623 [INFO][2862] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.653 [INFO][2870] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.653 [INFO][2870] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.653 [INFO][2870] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.661 [WARNING][2870] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.661 [INFO][2870] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" HandleID="k8s-pod-network.ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Workload="146.190.141.251-k8s-csi--node--driver--kx9d4-eth0" Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.664 [INFO][2870] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:23.666969 env[1189]: 2025-09-13 00:53:23.665 [INFO][2862] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82" Sep 13 00:53:23.667833 env[1189]: time="2025-09-13T00:53:23.667004380Z" level=info msg="TearDown network for sandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" successfully" Sep 13 00:53:23.672631 env[1189]: time="2025-09-13T00:53:23.672492938Z" level=info msg="RemovePodSandbox \"ce675bfb5973edc7ba9798ec7314fa4e8b6ee907cf23c9638e2078cfb27fbc82\" returns successfully" Sep 13 00:53:23.672902 nfsidmap[2822]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-de692acfb1' Sep 13 00:53:23.673973 env[1189]: time="2025-09-13T00:53:23.673926463Z" level=info msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.715 [WARNING][2888] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0b419cbd-cc2b-4fcb-b303-68389502eea2", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b", Pod:"nginx-deployment-7fcdb87857-shj29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicc52b560e33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.715 [INFO][2888] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.715 [INFO][2888] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" iface="eth0" netns="" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.715 [INFO][2888] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.715 [INFO][2888] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.740 [INFO][2895] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.740 [INFO][2895] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.740 [INFO][2895] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.748 [WARNING][2895] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.748 [INFO][2895] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.751 [INFO][2895] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:23.754996 env[1189]: 2025-09-13 00:53:23.752 [INFO][2888] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.755712 env[1189]: time="2025-09-13T00:53:23.755673206Z" level=info msg="TearDown network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" successfully" Sep 13 00:53:23.755797 env[1189]: time="2025-09-13T00:53:23.755777616Z" level=info msg="StopPodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" returns successfully" Sep 13 00:53:23.756431 env[1189]: time="2025-09-13T00:53:23.756405263Z" level=info msg="RemovePodSandbox for \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" Sep 13 00:53:23.756580 env[1189]: time="2025-09-13T00:53:23.756542720Z" level=info msg="Forcibly stopping sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\"" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.792 [WARNING][2910] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0", GenerateName:"nginx-deployment-7fcdb87857-", Namespace:"default", SelfLink:"", UID:"0b419cbd-cc2b-4fcb-b303-68389502eea2", ResourceVersion:"1267", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"7fcdb87857", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"ee608241cfcf046f77b5d6e33fbe6b462ff886b0f1c83063fb9921a0ec253a6b", Pod:"nginx-deployment-7fcdb87857-shj29", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calicc52b560e33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.792 [INFO][2910] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.792 [INFO][2910] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" iface="eth0" netns="" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.792 [INFO][2910] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.792 [INFO][2910] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.819 [INFO][2917] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.819 [INFO][2917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.819 [INFO][2917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.828 [WARNING][2917] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.828 [INFO][2917] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" HandleID="k8s-pod-network.4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Workload="146.190.141.251-k8s-nginx--deployment--7fcdb87857--shj29-eth0" Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.831 [INFO][2917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:23.834543 env[1189]: 2025-09-13 00:53:23.833 [INFO][2910] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9" Sep 13 00:53:23.835177 env[1189]: time="2025-09-13T00:53:23.834579025Z" level=info msg="TearDown network for sandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" successfully" Sep 13 00:53:23.836520 env[1189]: time="2025-09-13T00:53:23.836471671Z" level=info msg="RemovePodSandbox \"4024b772de4057c728aac61128a5cb618f73ee260d14fdbbc1968fd4285ec2a9\" returns successfully" Sep 13 00:53:24.529370 kubelet[1437]: E0913 00:53:24.529285 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:25.530463 kubelet[1437]: E0913 00:53:25.530388 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:26.531146 kubelet[1437]: E0913 00:53:26.531094 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:27.532555 kubelet[1437]: E0913 00:53:27.532507 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:28.533791 kubelet[1437]: E0913 00:53:28.533746 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:29.534933 kubelet[1437]: E0913 00:53:29.534884 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:29.815547 nfsidmap[2878]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.8-n-de692acfb1' Sep 13 00:53:29.842342 kernel: kauditd_printk_skb: 333 callbacks suppressed Sep 13 00:53:29.842553 kernel: audit: type=1400 audit(1757724809.834:773): avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.842604 kernel: audit: type=1300 audit(1757724809.834:773): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a7d3331e0 a2=10 a3=8fca2d6a8485c517 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.834000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.834000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a7d3331e0 a2=10 a3=8fca2d6a8485c517 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.834000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:53:29.847425 kernel: audit: type=1327 audit(1757724809.834:773): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:53:29.847524 kernel: audit: type=1400 audit(1757724809.834:774): avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.834000 audit[1259]: AVC avc: denied { watch_reads } for pid=1259 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.834000 audit[1259]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a7d3331e0 a2=10 a3=8fca2d6a8485c517 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.834000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:53:29.858618 kernel: audit: type=1300 audit(1757724809.834:774): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561a7d3331e0 a2=10 a3=8fca2d6a8485c517 items=0 ppid=1 pid=1259 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:29.858753 kernel: audit: type=1327 audit(1757724809.834:774): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Sep 13 00:53:29.858810 kernel: audit: type=1400 audit(1757724809.839:775): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.862056 env[1189]: time="2025-09-13T00:53:29.862005165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0c2af893-ece6-469f-9d27-b6f4cf8d4872,Namespace:default,Attempt:0,}" Sep 13 00:53:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.866712 kernel: audit: type=1400 audit(1757724809.839:776): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.839000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:29.870845 kernel: audit: type=1400 audit(1757724809.839:777): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2527 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Sep 13 00:53:30.152098 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Sep 13 00:53:30.152264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Sep 13 00:53:30.153766 systemd-networkd[1005]: cali5ec59c6bf6e: Link UP Sep 13 00:53:30.153943 systemd-networkd[1005]: cali5ec59c6bf6e: Gained carrier Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.945 [INFO][2931] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {146.190.141.251-k8s-test--pod--1-eth0 default 0c2af893-ece6-469f-9d27-b6f4cf8d4872 1399 0 2025-09-13 00:53:02 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 146.190.141.251 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] [] }} ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.945 [INFO][2931] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.992 [INFO][2944] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" HandleID="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Workload="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.992 [INFO][2944] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" HandleID="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Workload="146.190.141.251-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d56c0), Attrs:map[string]string{"namespace":"default", "node":"146.190.141.251", "pod":"test-pod-1", "timestamp":"2025-09-13 00:53:29.992693542 +0000 UTC"}, Hostname:"146.190.141.251", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.992 [INFO][2944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.993 [INFO][2944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:29.993 [INFO][2944] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host '146.190.141.251' Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.015 [INFO][2944] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.050 [INFO][2944] ipam/ipam.go 394: Looking up existing affinities for host host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.093 [INFO][2944] ipam/ipam.go 511: Trying affinity for 192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.097 [INFO][2944] ipam/ipam.go 158: Attempting to load block cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.103 [INFO][2944] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.53.192/26 host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.103 [INFO][2944] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.53.192/26 handle="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.109 [INFO][2944] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.121 [INFO][2944] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.53.192/26 handle="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.145 [INFO][2944] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.53.196/26] block=192.168.53.192/26 handle="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.145 [INFO][2944] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.53.196/26] handle="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" host="146.190.141.251" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.145 [INFO][2944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.145 [INFO][2944] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.53.196/26] IPv6=[] ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" HandleID="k8s-pod-network.3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Workload="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.179544 env[1189]: 2025-09-13 00:53:30.147 [INFO][2931] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0c2af893-ece6-469f-9d27-b6f4cf8d4872", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:30.180539 env[1189]: 2025-09-13 00:53:30.147 [INFO][2931] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.53.196/32] ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.180539 env[1189]: 2025-09-13 00:53:30.147 [INFO][2931] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.180539 env[1189]: 2025-09-13 00:53:30.152 [INFO][2931] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.180539 env[1189]: 2025-09-13 00:53:30.155 [INFO][2931] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"146.190.141.251-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"0c2af893-ece6-469f-9d27-b6f4cf8d4872", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2025, time.September, 13, 0, 53, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"146.190.141.251", ContainerID:"3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.53.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"16:32:96:0b:73:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Sep 13 00:53:30.180539 env[1189]: 2025-09-13 00:53:30.177 [INFO][2931] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="146.190.141.251-k8s-test--pod--1-eth0" Sep 13 00:53:30.194648 env[1189]: time="2025-09-13T00:53:30.194543361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 13 00:53:30.194648 env[1189]: time="2025-09-13T00:53:30.194588081Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 13 00:53:30.194648 env[1189]: time="2025-09-13T00:53:30.194598906Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 13 00:53:30.195163 env[1189]: time="2025-09-13T00:53:30.195103795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae pid=2967 runtime=io.containerd.runc.v2 Sep 13 00:53:30.213245 systemd[1]: Started cri-containerd-3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae.scope. Sep 13 00:53:30.234000 audit[2992]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:30.234000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffcc2738620 a2=0 a3=7ffcc273860c items=0 ppid=2065 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.234000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Sep 13 00:53:30.238361 kernel: audit: type=1325 audit(1757724810.234:778): table=filter:84 family=2 entries=40 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit: BPF prog-id=123 op=LOAD Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2967 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323963363633343562346138653335393164646565643233656233 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2967 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323963363633343562346138653335393164646565643233656233 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit: BPF prog-id=124 op=LOAD Sep 13 00:53:30.241000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000253ce0 items=0 ppid=2967 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323963363633343562346138653335393164646565643233656233 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit: BPF prog-id=125 op=LOAD Sep 13 00:53:30.241000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000253d28 items=0 ppid=2967 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323963363633343562346138653335393164646565643233656233 Sep 13 00:53:30.241000 audit: BPF prog-id=125 op=UNLOAD Sep 13 00:53:30.241000 audit: BPF prog-id=124 op=UNLOAD Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { perfmon } for pid=2978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit[2978]: AVC avc: denied { bpf } for pid=2978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.241000 audit: BPF prog-id=126 op=LOAD Sep 13 00:53:30.241000 audit[2978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000358138 items=0 ppid=2967 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334323963363633343562346138653335393164646565643233656233 Sep 13 00:53:30.283158 env[1189]: time="2025-09-13T00:53:30.283108387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:0c2af893-ece6-469f-9d27-b6f4cf8d4872,Namespace:default,Attempt:0,} returns sandbox id \"3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae\"" Sep 13 00:53:30.284681 env[1189]: time="2025-09-13T00:53:30.284646479Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Sep 13 00:53:30.535878 kubelet[1437]: E0913 00:53:30.535826 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:30.796806 env[1189]: time="2025-09-13T00:53:30.796672715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:30.798158 env[1189]: time="2025-09-13T00:53:30.798122546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:30.800316 env[1189]: time="2025-09-13T00:53:30.800261122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:30.805904 env[1189]: time="2025-09-13T00:53:30.805867555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:883ca821a91fc20bcde818eeee4e1ed55ef63a020d6198ecd5a03af5a4eac530,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Sep 13 00:53:30.806887 env[1189]: time="2025-09-13T00:53:30.806853686Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:4cbb30cb60f877a307c1f0bcdaca389dd24689ff60c6fb370f0cca7367185c48\"" Sep 13 00:53:30.813885 env[1189]: time="2025-09-13T00:53:30.813842363Z" level=info msg="CreateContainer within sandbox \"3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae\" for container &ContainerMetadata{Name:test,Attempt:0,}" Sep 13 00:53:30.830367 env[1189]: time="2025-09-13T00:53:30.830279140Z" level=info msg="CreateContainer within sandbox \"3429c66345b4a8e3591ddeed23eb3c840a0204143690ed1eb22fcfac4d14b3ae\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9fb0d630aeb3293c4035d738e94810b87fe9da55d6a65dcefb99512e0f5d6d15\"" Sep 13 00:53:30.830967 env[1189]: time="2025-09-13T00:53:30.830924652Z" level=info msg="StartContainer for \"9fb0d630aeb3293c4035d738e94810b87fe9da55d6a65dcefb99512e0f5d6d15\"" Sep 13 00:53:30.861957 systemd[1]: run-containerd-runc-k8s.io-9fb0d630aeb3293c4035d738e94810b87fe9da55d6a65dcefb99512e0f5d6d15-runc.KjSQ6M.mount: Deactivated successfully. Sep 13 00:53:30.867327 systemd[1]: Started cri-containerd-9fb0d630aeb3293c4035d738e94810b87fe9da55d6a65dcefb99512e0f5d6d15.scope. Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.885000 audit: BPF prog-id=127 op=LOAD Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2967 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623064363330616562333239336334303335643733386539343831 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2967 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623064363330616562333239336334303335643733386539343831 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit: BPF prog-id=128 op=LOAD Sep 13 00:53:30.886000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028b050 items=0 ppid=2967 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623064363330616562333239336334303335643733386539343831 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit: BPF prog-id=129 op=LOAD Sep 13 00:53:30.886000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028b098 items=0 ppid=2967 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623064363330616562333239336334303335643733386539343831 Sep 13 00:53:30.886000 audit: BPF prog-id=129 op=UNLOAD Sep 13 00:53:30.886000 audit: BPF prog-id=128 op=UNLOAD Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { perfmon } for pid=3013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit[3013]: AVC avc: denied { bpf } for pid=3013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Sep 13 00:53:30.886000 audit: BPF prog-id=130 op=LOAD Sep 13 00:53:30.886000 audit[3013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028b4a8 items=0 ppid=2967 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Sep 13 00:53:30.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966623064363330616562333239336334303335643733386539343831 Sep 13 00:53:30.904179 env[1189]: time="2025-09-13T00:53:30.903459800Z" level=info msg="StartContainer for \"9fb0d630aeb3293c4035d738e94810b87fe9da55d6a65dcefb99512e0f5d6d15\" returns successfully" Sep 13 00:53:31.536355 kubelet[1437]: E0913 00:53:31.536273 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:31.539651 systemd-networkd[1005]: cali5ec59c6bf6e: Gained IPv6LL Sep 13 00:53:32.536980 kubelet[1437]: E0913 00:53:32.536929 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:33.538090 kubelet[1437]: E0913 00:53:33.538038 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:34.539119 kubelet[1437]: E0913 00:53:34.539050 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:35.539807 kubelet[1437]: E0913 00:53:35.539760 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:36.540929 kubelet[1437]: E0913 00:53:36.540863 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:37.542671 kubelet[1437]: E0913 00:53:37.542612 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Sep 13 00:53:38.544005 kubelet[1437]: E0913 00:53:38.543959 1437 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"